fig_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) [ 441.016295] tmpfs: Bad value for 'nr_blocks' [ 441.020105] FAT-fs (loop1): unable to read boot sector [ 441.041299] FAT-fs (loop1): unable to read boot sector 13:24:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x100000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x543}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {0x0}, {&(0x7f0000011500)="ed41000000080000daf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2100}, {0x0}, {&(0x7f0000012800)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012e00)) 13:24:08 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) (fail_nth: 4) 13:24:08 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:24:08 executing program 4: request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='{\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 13:24:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) [ 441.156618] FAULT_INJECTION: forcing a failure. [ 441.156618] name failslab, interval 1, probability 0, space 0, times 0 [ 441.157684] CPU: 1 UID: 0 PID: 5620 Comm: syz-executor.6 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 441.157701] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 441.157708] Call Trace: [ 441.157712] [ 441.157716] dump_stack_lvl+0xfa/0x120 [ 441.157741] should_fail_ex+0x4d7/0x5e0 [ 441.157757] ? do_epoll_ctl+0x2138/0x3140 [ 441.157777] should_failslab+0xc2/0x120 [ 441.157795] kmem_cache_alloc_noprof+0x72/0x680 [ 441.157815] ? do_epoll_ctl+0x2138/0x3140 [ 441.157832] do_epoll_ctl+0x2138/0x3140 [ 441.157859] ? __pfx_do_epoll_ctl+0x10/0x10 [ 441.157876] ? __might_fault+0x138/0x190 [ 441.157893] ? lock_release+0xc8/0x290 [ 441.157909] ? __might_fault+0xe0/0x190 [ 441.157931] __x64_sys_epoll_ctl+0x142/0x1c0 [ 441.157943] ? __pfx___x64_sys_epoll_ctl+0x10/0x10 [ 441.157961] do_syscall_64+0xbf/0x390 [ 441.157982] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 441.157994] RIP: 0033:0x7faeab841b19 [ 441.158003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 441.158015] RSP: 002b:00007faea8db7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 441.158026] RAX: ffffffffffffffda RBX: 00007faeab954f60 RCX: 00007faeab841b19 [ 441.158035] RDX: 0000000000000005 RSI: 0000000000000001 RDI: 0000000000000004 [ 441.158041] RBP: 00007faea8db71d0 R08: 0000000000000000 R09: 0000000000000000 [ 441.158048] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 441.158055] R13: 00007ffc4a3e9cef R14: 00007faea8db7300 R15: 0000000000022000 [ 441.158074] 13:24:08 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r0, 0x200, 0x70bd25, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x3, 0x2e}}}}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0xc000) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) getsockopt$IP_SET_OP_GET_FNAME(r2, 0x1, 0x53, &(0x7f0000000000)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000040)=0x2c) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x89e1, 0x0) [ 441.235293] loop2: detected capacity change from 0 to 2048 13:24:08 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) r4 = getpid() r5 = pidfd_open(r4, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r5, &(0x7f0000000040)={r0, r3, 0x8001}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) clone3(&(0x7f00000002c0)={0x2000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2e}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/164, &(0x7f0000000280)=[r1], 0x1, {r6}}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) 13:24:08 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) (fail_nth: 5) 13:24:08 executing program 1: r0 = epoll_create1(0x0) r1 = getpid() r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) r4 = getpid() prctl$PR_SCHED_CORE(0x3e, 0x2, r1, 0x1, &(0x7f00000000c0)) r5 = pidfd_open(r4, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r5, &(0x7f0000000040)={r0, r3, 0x8001}) capset(&(0x7f0000000080)={0x20071026, r1}, &(0x7f0000000000)={0x200003, 0xfffffffd, 0x0, 0x0, 0x400}) capset(&(0x7f0000000580)={0x19980330}, &(0x7f0000000240)={0x0, 0x0, 0x8}) 13:24:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) [ 441.381613] capability: warning: `syz-executor.1' uses deprecated v2 capabilities in a way that may be insecure [ 441.398935] capability: warning: `syz-executor.1' uses 32-bit capabilities (legacy support in use) 13:24:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x543}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {0x0}, {&(0x7f0000011500)="ed41000000080000daf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2100}, {0x0}, {&(0x7f0000012800)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012e00)) 13:24:19 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) r4 = getpid() r5 = pidfd_open(r4, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r5, &(0x7f0000000040)={r0, r3, 0x8001}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) clone3(&(0x7f00000002c0)={0x2000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2e}, &(0x7f00000000c0)=""/206, 0xce, &(0x7f00000001c0)=""/164, &(0x7f0000000280)=[r1], 0x1, {r6}}, 0x58) 13:24:19 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @empty, @val={@void}, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @source_quench={0x3, 0x2, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @dev, @dev}, "0000010000000000"}}}}}, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000000)=""/68, 0x44, 0x12103, &(0x7f0000000100)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80) 13:24:19 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) (fail_nth: 6) 13:24:19 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040)={0x1f, @fixed}, 0x8) connect$bt_sco(r0, &(0x7f0000000080)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) listen(r0, 0xfffffffe) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp(0x2, 0x2, 0x1) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x147004, 0x0) bind$bt_sco(r3, &(0x7f0000000180)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x8) bind(r1, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3, 0x2, 0x4}}, 0x80) 13:24:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) (fail_nth: 1) 13:24:19 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r2}, 0x14) 13:24:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x1, 0x0, 0x4, 0x5, 0x0, 0x7, 0xe8102, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x5, @perf_config_ext={0x1, 0x6}, 0x200, 0x1, 0x8, 0xf8829b93287df20d, 0x2, 0x100, 0x3, 0x0, 0xfffffffa, 0x0, 0x200}, 0xffffffffffffffff, 0x4, r0, 0x1) [ 452.791352] loop2: detected capacity change from 0 to 512 [ 452.809986] FAULT_INJECTION: forcing a failure. [ 452.809986] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 452.812161] CPU: 0 UID: 0 PID: 5666 Comm: syz-executor.0 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 452.812191] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 452.812203] Call Trace: [ 452.812212] [ 452.812221] dump_stack_lvl+0xfa/0x120 [ 452.812268] should_fail_ex+0x4d7/0x5e0 [ 452.812307] _copy_from_user+0x30/0xd0 [ 452.812340] vt_do_kbkeycode_ioctl+0x97/0x2c0 [ 452.812373] ? __pfx_vt_do_kbkeycode_ioctl+0x10/0x10 [ 452.812418] ? cap_capable+0xdb/0x3b0 [ 452.812455] ? security_capable+0x2f/0x90 [ 452.812514] vt_ioctl+0x9bc/0x2e60 [ 452.812561] ? __pfx_vt_ioctl+0x10/0x10 [ 452.812590] ? perf_trace_run_bpf_submit+0xef/0x180 [ 452.812647] ? perf_trace_lock+0x337/0x5d0 [ 452.812704] ? perf_trace_run_bpf_submit+0xef/0x180 [ 452.812739] ? perf_trace_run_bpf_submit+0xef/0x180 [ 452.812768] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 452.812811] ? __pfx_vt_ioctl+0x10/0x10 [ 452.812849] tty_ioctl+0x78b/0x1810 [ 452.812889] ? __pfx_tty_ioctl+0x10/0x10 [ 452.812918] ? ioctl_has_perm.constprop.0.isra.0+0x331/0x4e0 [ 452.812955] ? __mutex_unlock_slowpath+0x151/0x750 [ 452.812993] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 452.813035] ? down_read_nested+0x29c/0x470 [ 452.813066] ? __fget_files+0x34/0x3b0 [ 452.813097] ? find_held_lock+0x2b/0x80 [ 452.813132] ? __fget_files+0x203/0x3b0 [ 452.813161] ? lock_release+0xc8/0x290 [ 452.813215] ? selinux_file_ioctl+0xb9/0x280 [ 452.813259] ? __pfx_tty_ioctl+0x10/0x10 [ 452.813309] __x64_sys_ioctl+0x18f/0x210 [ 452.813345] do_syscall_64+0xbf/0x390 [ 452.813387] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 452.813411] RIP: 0033:0x7f217526fb19 [ 452.813428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 452.813449] RSP: 002b:00007f21727e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 452.813470] RAX: ffffffffffffffda RBX: 00007f2175382f60 RCX: 00007f217526fb19 [ 452.813484] RDX: 0000000020000000 RSI: 0000000000004b4c RDI: 0000000000000003 [ 452.813498] RBP: 00007f21727e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 452.813511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 452.813524] R13: 00007ffdeb4a7b9f R14: 00007f21727e5300 R15: 0000000000022000 [ 452.813588] [ 452.846453] FAULT_INJECTION: forcing a failure. [ 452.846453] name failslab, interval 1, probability 0, space 0, times 0 [ 452.848146] CPU: 0 UID: 0 PID: 5663 Comm: syz-executor.6 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 452.848174] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 452.848186] Call Trace: [ 452.848194] [ 452.848204] dump_stack_lvl+0xfa/0x120 [ 452.848245] should_fail_ex+0x4d7/0x5e0 [ 452.848279] ? ep_ptable_queue_proc+0x5b/0x280 [ 452.848311] should_failslab+0xc2/0x120 [ 452.848344] ? __pfx_ep_ptable_queue_proc+0x10/0x10 [ 452.848374] kmem_cache_alloc_noprof+0x72/0x680 [ 452.848401] ? __pfx_perf_trace_lock+0x10/0x10 [ 452.848426] ? __memcg_slab_post_alloc_hook+0x4ac/0x9e0 [ 452.848460] ? __pfx_ep_ptable_queue_proc+0x10/0x10 [ 452.848511] ? ep_ptable_queue_proc+0x5b/0x280 [ 452.848541] ep_ptable_queue_proc+0x5b/0x280 [ 452.848571] ? __pfx_ep_ptable_queue_proc+0x10/0x10 [ 452.848611] pidfd_poll+0x93/0x3f0 [ 452.848652] ? __pfx_pidfd_poll+0x10/0x10 [ 452.848683] ep_item_poll+0x140/0x1f0 [ 452.848728] do_epoll_ctl+0x1c77/0x3140 [ 452.848802] ? __pfx_do_epoll_ctl+0x10/0x10 [ 452.848834] ? __might_fault+0x138/0x190 [ 452.848867] ? lock_release+0xc8/0x290 [ 452.848893] ? __pfx_ep_ptable_queue_proc+0x10/0x10 [ 452.848964] __x64_sys_epoll_ctl+0x142/0x1c0 [ 452.848989] ? __pfx___x64_sys_epoll_ctl+0x10/0x10 [ 452.849044] do_syscall_64+0xbf/0x390 [ 452.849086] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 452.849108] RIP: 0033:0x7faeab841b19 [ 452.849126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 452.849146] RSP: 002b:00007faea8db7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 452.849166] RAX: ffffffffffffffda RBX: 00007faeab954f60 RCX: 00007faeab841b19 [ 452.849180] RDX: 0000000000000005 RSI: 0000000000000001 RDI: 0000000000000004 [ 452.849193] RBP: 00007faea8db71d0 R08: 0000000000000000 R09: 0000000000000000 [ 452.849206] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 13:24:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = request_key(&(0x7f0000000280)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)='[[-\x03$%,\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000140), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r0) getresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {}, [{0x2, 0x0, 0xee01}]}, 0x2c, 0x0) r1 = getpid() pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x7, 0x9, 0x20, 0x9, 0x0, 0x81, 0x0, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6794, 0x1, @perf_config_ext={0x7, 0x32}, 0x840, 0x2, 0x3, 0x9, 0x0, 0x1, 0x1442, 0x0, 0x0, 0x0, 0x9}, r1, 0xc, 0xffffffffffffffff, 0x8) [ 452.849219] R13: 00007ffc4a3e9cef R14: 00007faea8db7300 R15: 0000000000022000 [ 452.849298] [ 452.894596] EXT4-fs (loop2): invalid inodes per group: 0 [ 452.894596] 13:24:30 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x200004, 0x408440) mmap(&(0x7f0000ff3000/0x1000)=nil, 0x1000, 0x80eb47da4c60b37, 0x12, r0, 0x0) 13:24:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r2}, 0x14) 13:24:30 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x8c000) bind$bt_hci(r1, &(0x7f0000000700)={0x1f, 0x3}, 0x6) write$bt_hci(r0, &(0x7f0000000240)={0x1, @set_cpb={{0x441, 0xb}}}, 0x178) 13:24:30 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) r4 = getpid() r5 = pidfd_open(r4, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r5, &(0x7f0000000040)={r0, r3, 0x8001}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) 13:24:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012e00)) 13:24:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getsockname$unix(0xffffffffffffffff, 0x0, &(0x7f0000000300)) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x1ff) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = dup(r0) connect$802154_dgram(r1, &(0x7f0000000000)={0x24, @long}, 0x11) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r1) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x1c, r2, 0x100, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44011}, 0x24000010) openat$snapshot(0xffffffffffffff9c, &(0x7f0000001340), 0x3, 0x0) 13:24:30 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) (fail_nth: 2) 13:24:30 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) (fail_nth: 7) [ 463.306484] FAULT_INJECTION: forcing a failure. [ 463.306484] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 463.309072] CPU: 0 UID: 0 PID: 5692 Comm: syz-executor.0 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 463.309101] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 463.309113] Call Trace: [ 463.309121] [ 463.309131] dump_stack_lvl+0xfa/0x120 [ 463.309175] should_fail_ex+0x4d7/0x5e0 [ 463.309212] _copy_to_user+0x32/0xd0 [ 463.309246] simple_read_from_buffer+0xe0/0x180 [ 463.309283] proc_fail_nth_read+0x18a/0x240 [ 463.309323] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 463.309362] ? security_file_permission+0x22/0x90 [ 463.309420] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 463.309472] vfs_read+0x1eb/0xc70 [ 463.309545] ? __pfx_vfs_read+0x10/0x10 [ 463.309581] ? lock_release+0xc8/0x290 [ 463.309625] ? __fget_files+0x20d/0x3b0 [ 463.309687] ksys_read+0x121/0x240 [ 463.309716] ? __pfx_ksys_read+0x10/0x10 [ 463.309777] do_syscall_64+0xbf/0x390 [ 463.309819] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 463.309841] RIP: 0033:0x7f217522269c [ 463.309859] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 463.309878] RSP: 002b:00007f21727e5170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 463.309899] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f217522269c [ 463.309914] RDX: 000000000000000f RSI: 00007f21727e51e0 RDI: 0000000000000005 [ 463.309926] RBP: 00007f21727e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 463.309939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 463.309952] R13: 00007ffdeb4a7b9f R14: 00007f21727e5300 R15: 0000000000022000 [ 463.310015] [ 463.316443] No source specified 13:24:30 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r3) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x2000401, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000}, {@debug}, {@uname={'uname', 0x3d, '.-'}}, {@version_9p2000}, {@access_any}, {@access_client}, {@debug={'debug', 0x3d, 0xd4eb}}, {@afid={'afid', 0x3d, 0xff}}, {@nodevmap}, {@access_client}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@subj_user={'subj_user', 0x3d, 'noextend'}}, {@fowner_gt={'fowner>', r3}}]}}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee00}}, {@noextend}]}}) 13:24:30 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) (fail_nth: 8) 13:24:30 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:24:30 executing program 3: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x8a, 0xffff787c, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x8, 0x20, 0xffffffff, 0x5}}) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)="d9543038a1b282d50a0127a3fe787904192e30be12e051656ca28132eba1a51d12f95180d319eef8bb32a4a5275ed0721e7666ca07423b043d77f268a4db33451cf00ae47cb045f9bc4e0385ab12e07ac5", 0x51) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x189100, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vcan0\x00'}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000100)={0x0, 0x3, [@multicast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x39}, @empty]}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller1\x00'}) 13:24:30 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) r4 = getpid() r5 = pidfd_open(r4, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r5, &(0x7f0000000040)={r0, r3, 0x8001}) read(0xffffffffffffffff, &(0x7f0000000040)=""/102, 0x66) 13:24:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r2}, 0x14) 13:24:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012e00)) 13:24:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0x0) getsockname$unix(0xffffffffffffffff, 0x0, &(0x7f0000000300)) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x1ff) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = dup(r0) connect$802154_dgram(r1, &(0x7f0000000000)={0x24, @long}, 0x11) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r1) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x1c, r2, 0x100, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44011}, 0x24000010) openat$snapshot(0xffffffffffffff9c, &(0x7f0000001340), 0x3, 0x0) [ 463.548726] FAULT_INJECTION: forcing a failure. [ 463.548726] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 463.550342] CPU: 0 UID: 0 PID: 5704 Comm: syz-executor.6 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 463.550369] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 463.550380] Call Trace: [ 463.550388] [ 463.550397] dump_stack_lvl+0xfa/0x120 [ 463.550438] should_fail_ex+0x4d7/0x5e0 [ 463.550473] _copy_to_user+0x32/0xd0 [ 463.550511] simple_read_from_buffer+0xe0/0x180 [ 463.550547] proc_fail_nth_read+0x18a/0x240 [ 463.550584] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 463.550618] ? security_file_permission+0x22/0x90 [ 463.550649] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 463.550682] vfs_read+0x1eb/0xc70 [ 463.550727] ? __pfx_vfs_read+0x10/0x10 [ 463.550760] ? lock_release+0xc8/0x290 [ 463.550799] ? __fget_files+0x20d/0x3b0 [ 463.550855] ksys_read+0x121/0x240 [ 463.550882] ? __pfx_ksys_read+0x10/0x10 [ 463.550936] do_syscall_64+0xbf/0x390 [ 463.550975] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 463.550995] RIP: 0033:0x7faeab7f469c [ 463.551011] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 463.551029] RSP: 002b:00007faea8db7170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 463.551047] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faeab7f469c [ 463.551060] RDX: 000000000000000f RSI: 00007faea8db71e0 RDI: 0000000000000006 [ 463.551071] RBP: 00007faea8db71d0 R08: 0000000000000000 R09: 0000000000000000 [ 463.551083] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 463.551094] R13: 00007ffc4a3e9cef R14: 00007faea8db7300 R15: 0000000000022000 [ 463.551151] [ 463.552098] 9pnet_fd: Insufficient options for proto=fd [ 463.622787] No source specified 13:24:30 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:24:30 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x2, &(0x7f0000000000)={0x1000}) 13:24:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100), 0x14) 13:24:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000012e00)) 13:24:41 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {r1}}, './file0\x00'}) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000180), 0x41e540, 0x0) r3 = openat$incfs(r2, &(0x7f0000000240)='.pending_reads\x00', 0x80020, 0x9) ioctl$FIONREAD(r3, 0x4b4c, &(0x7f0000000280)) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000100)=0x81) r5 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x101040, 0xa0}, 0x18) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x2, 0x9, 0x6, 0x1, 0x0, 0x0, 0x20040, 0x7, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x8, 0x3}, 0x1864, 0x9, 0x0, 0xb, 0x6f, 0x200, 0x800, 0x0, 0x200, 0x0, 0x3}, 0xffffffffffffffff, 0x7, r6, 0xa) ioctl$TIOCGICOUNT(r5, 0x545d, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r7, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000140)={0xd, 0x1}) ioctl$TCSBRK(r7, 0x5409, 0x8) 13:24:41 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x2, r2, &(0x7f0000000000)) 13:24:41 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={0x0, 0x4, 0x2}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000480)={r1, 0x3, 0x6, 0x1}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r2, 0x1) 13:24:41 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r0}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0xe8, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r0}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xc116}, @NL80211_ATTR_IE={0xc2, 0x2a, [@random_vendor={0xdd, 0xa8, "6ab4c58b31ef20c214fd695619a23f261d69c43b555f528b88f3e17a1abb4a0ac6e5f9ea30c9cb9e1ae3dd6f5c3bc109013f5d9557e38c3f25a3808c61cdf7471b5a0596c4a2d9476278249fcd263ffbd634cfe9f50fdaf857928e6630403ecd8358960e2b7c02e109689e33fee971111054819a4ad75560c8b1b98e1e5b2f7fefa965159f6f39eab7a7c95e0f0d4751067bb73439a6d0de773260766809ebad7057ebfd3fdd6bb0"}, @link_id={0x65, 0x12, {@random="0500", @device_b, @device_b}}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x80}, 0xc000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x34, r2, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r3}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x9a8}], @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x962}]]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_STOP_NAN(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r3}, @void}}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000084}, 0x20008000) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002b80)={0x0, 0x0, 0x0}, 0x0) r5 = dup(0xffffffffffffffff) r6 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x12, r6, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x12, r5, 0x0) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f0000000440)=""/212) pwritev2(r4, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0x1}], 0x1, 0x2, 0x0, 0x0) 13:24:41 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b2f, &(0x7f0000000000)={0x1000}) 13:24:41 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) r4 = getpid() r5 = pidfd_open(r4, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r5, &(0x7f0000000040)={r0, r3, 0x8001}) read(0xffffffffffffffff, &(0x7f0000000040)=""/102, 0x66) [ 474.851446] No source specified 13:24:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100), 0x14) 13:24:41 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) r4 = getpid() r5 = pidfd_open(r4, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r5, &(0x7f0000000040)={r0, r3, 0x8001}) read(0xffffffffffffffff, &(0x7f0000000040)=""/102, 0x66) 13:24:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100), 0x14) 13:24:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x543}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {0x0}, {&(0x7f0000011500)="ed41000000080000daf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2100}, {0x0}], 0x0, &(0x7f0000012e00)) 13:24:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b30, &(0x7f0000000000)={0x1000}) 13:24:42 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:24:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x10d042, 0x1ff) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='#! ./file1'], 0xb) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) [ 475.055168] loop2: detected capacity change from 0 to 33 13:24:42 executing program 1: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)="d9543038a1b282d50a0127a3fe787904192e30be12e051656ca28132eba1a51d12f95180d319eef8bb32a4a5275ed0721e7666ca07423b043d77f268a4db33451cf00ae47cb045f9bc4e0385ab12e07ac5", 0x51) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'vcan0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller1\x00'}) [ 475.065004] EXT4-fs (loop2): invalid inodes per group: 0 [ 475.065004] 13:24:42 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) getpid() r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) r3 = getpid() pidfd_open(r3, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) 13:24:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:24:53 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={0x0, 0x4, 0x2}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000480)={r1, 0x3, 0x6, 0x1}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r2, 0x1) 13:24:53 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000440), 0x145c02, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000080)=ANY=[@ANYBLOB="011800000000171aa0706fa1", @ANYRES32=r0, @ANYBLOB="da000000000000002e2f66696c653000"]) io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) io_setup(0xfff, &(0x7f0000000040)=0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000100)={0x3, 0x3df, 0x1, 0x0, 0xf}) fcntl$setstatus(r0, 0x4, 0x0) r4 = openat$cgroup(r3, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) dup(r4) io_submit(r2, 0x1, &(0x7f00000003c0)=[&(0x7f0000000280)={0x0, 0x0, 0x8, 0x0, 0x0, r0, &(0x7f0000000000)="fa", 0x80000}]) 13:24:53 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) getpid() r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) getpid() r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) 13:24:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:24:53 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)={0x4}) 13:24:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b32, &(0x7f0000000000)={0x1000}) 13:24:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:24:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x543}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {0x0}, {&(0x7f0000011500)="ed41000000080000daf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000012e00)) [ 486.015716] loop2: detected capacity change from 0 to 33 [ 486.024357] EXT4-fs (loop2): invalid inodes per group: 0 [ 486.024357] 13:24:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:24:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x543}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000012e00)) [ 486.119768] loop2: detected capacity change from 0 to 8 [ 486.136729] EXT4-fs (loop2): invalid inodes per group: 0 [ 486.136729] 13:24:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:24:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b33, &(0x7f0000000000)={0x1000}) 13:24:53 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)={0x4000000}) 13:24:53 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) getpid() r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) 13:25:03 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={0x0, 0x4, 0x2}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000480)={r1, 0x3, 0x6, 0x1}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r2, 0x1) 13:25:03 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x0) getpid() r0 = getpid() pidfd_open(r0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) 13:25:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x543}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000012e00)) 13:25:03 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b34, &(0x7f0000000000)={0x1000}) 13:25:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:25:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40500, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0xffffffff) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x1, 0x6b4e, 0x80000000}) gettid() waitid(0x0, 0x0, 0x0, 0x2, 0x0) 13:25:03 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:25:03 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)={0x0, 0x4}) [ 496.806243] loop2: detected capacity change from 0 to 8 [ 496.817388] EXT4-fs (loop2): invalid inodes per group: 0 [ 496.817388] 13:25:03 executing program 1: timer_create(0x3, 0x0, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) timer_create(0x7b84f2af3c4a217b, &(0x7f0000000140)={0x0, 0x1b, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, 0x0) timer_gettime(r0, &(0x7f0000000000)) 13:25:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x543}], 0x0, &(0x7f0000012e00)) 13:25:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:25:03 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b35, &(0x7f0000000000)={0x1000}) [ 496.938963] loop2: detected capacity change from 0 to 5 [ 496.955584] audit: type=1326 audit(1758720303.992:18): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5850 comm="syz-executor.1" exe="/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f244c792b19 code=0x0 13:25:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:25:04 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)={0x0, 0x4000000}) [ 497.004032] EXT4-fs (loop2): invalid inodes per group: 0 [ 497.004032] 13:25:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:25:04 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x0) getpid() getpid() r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) [ 497.771111] audit: type=1326 audit(1758720304.809:19): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5850 comm="syz-executor.1" exe="/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f244c792b19 code=0x0 [ 508.703865] loop2: detected capacity change from 0 to 4 [ 508.716645] EXT4-fs (loop2): invalid inodes per group: 0 [ 508.716645] 13:25:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:25:15 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={0x0, 0x4, 0x2}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000480)={r1, 0x3, 0x6, 0x1}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r2, 0x1) 13:25:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:25:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:25:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:25:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="060bce10d4", 0x5}, {&(0x7f0000000340)="4e0edc36076deb0caa81e9238ce062193c0526bdf5fcbde6671c236164f2e7828bf0652bc0956dad7b21852041cc1a0bb657e778fa4e6d65931d583a2ae063435e882d8b7dd08fec54f17e253a971b74681c30b2ce0b3205504519ca5e4103c201ce7981f560019b7a406734925d40e90c39e980fdfd172df1861e994f583eb4fc1ebbcf5a15fa8b8a036a71cfddb79a257c4420361e2f425081c3fb73fe491d29434286899302649673ae2eb4c8d8b1a3503a1a4acd7ea82c739de558a1a29cda49", 0xc2}, {&(0x7f0000000d80)="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", 0xf39}], 0x3}}], 0x1, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000c00)='/sys/kernel/kexec_loaded', 0x0, 0x0) lseek(r1, 0x4, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x8000000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000004680)={&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000046c0)=0x40) 13:25:15 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)={0x0, 0x400000000000000}) 13:25:15 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x0) getpid() r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:25:15 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:25:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}], 0x0, &(0x7f0000012e00)) 13:25:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b37, &(0x7f0000000000)={0x1000}) 13:25:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) [ 508.851336] loop2: detected capacity change from 0 to 4 [ 508.858826] EXT4-fs (loop2): unsupported descriptor size 0 13:25:15 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:25:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}], 0x0, &(0x7f0000012e00)) 13:25:15 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:25:15 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b31, &(0x7f0000000000)={0x1000}) 13:25:15 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [], {}, [{0x8, 0x0, r4}]}, 0x2c, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000000)={{}, {}, [], {}, [{0x8, 0x1, r2}, {0x8, 0x4, r4}, {0x8, 0x2, r2}]}, 0x3c, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f00000002c0)='./file0\x00', 0x1fffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000340)={[{@huge_never}, {@gid={'gid', 0x3d, r2}}, {@size={'size', 0x3d, [0x37, 0x70, 0x32]}}, {@uid={'uid', 0x3d, r1}}, {@huge_always}]}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x1080, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_u}], [{@uid_lt}, {@subj_user}]}}) r7 = syz_io_uring_complete(0x0) getsockopt$IP_VS_SO_GET_DAEMON(r6, 0x0, 0x487, &(0x7f0000000240), &(0x7f0000000280)=0x30) symlinkat(&(0x7f00000001c0)='./file0\x00', r7, &(0x7f0000000200)='./file0\x00') [ 508.990408] tmpfs: Invalid gid '0x00000000ffffffff' 13:25:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}], 0x0, &(0x7f0000012e00)) [ 509.005048] tmpfs: Invalid gid '0x00000000ffffffff' 13:25:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:25:25 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={0x0, 0x4, 0x2}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000480)={r1, 0x3, 0x6, 0x1}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 13:25:25 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:25:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:25:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:25:25 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b31, &(0x7f0000000000)={0x1000}) 13:25:25 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000040)={0x10}) 13:25:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) [ 518.856916] loop2: detected capacity change from 0 to 4 13:25:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3b, &(0x7f0000000000)={0x1000}) 13:25:25 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b31, &(0x7f0000000000)={0x1000}) [ 518.891294] EXT4-fs (loop2): unsupported descriptor size 0 13:25:26 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:25:26 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:25:26 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1010, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:25:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:25:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 519.090717] loop2: detected capacity change from 0 to 4 [ 519.096415] EXT4-fs (loop2): unsupported descriptor size 0 13:25:35 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={0x0, 0x4, 0x2}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000480)={r1, 0x3, 0x6, 0x1}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 13:25:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:25:35 executing program 6: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000040)={0x3, 0x1, {0x2, 0x2, 0xb44, 0x2, 0x7fffffff}, 0x401}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0xbbb, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = getpgrp(r1) process_vm_writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/211, 0xd3}, {&(0x7f00000001c0)=""/57, 0x39}], 0x2, &(0x7f0000000300)=[{&(0x7f0000000240)=""/188, 0xbc}], 0x1, 0x0) r3 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) 13:25:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:25:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3c, &(0x7f0000000000)={0x1000}) 13:25:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:25:35 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:25:35 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) [ 528.634169] loop2: detected capacity change from 0 to 4 [ 528.659321] EXT4-fs (loop2): unsupported descriptor size 0 13:25:35 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:25:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:25:35 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:25:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d", 0x7, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:25:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3d, &(0x7f0000000000)={0x1000}) 13:25:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:25:35 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) r4 = getpgid(r2) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xc5, 0x7, 0x7, 0xff, 0x0, 0xed, 0x20104, 0x5, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000, 0xa, @perf_config_ext={0x1000, 0x1}, 0x6, 0x0, 0x619, 0x1, 0x0, 0x0, 0x6, 0x0, 0x5, 0x0, 0x2}, r4, 0xffffffffffffffff, r0, 0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) 13:25:35 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) [ 528.904689] loop2: detected capacity change from 0 to 4 [ 528.924275] EXT4-fs (loop2): unsupported descriptor size 0 13:25:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:25:45 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={0x0, 0x4, 0x2}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000480)={r1, 0x3, 0x6, 0x1}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 13:25:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b44, &(0x7f0000000000)={0x1000}) 13:25:45 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:25:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:25:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d", 0x7, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:25:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:25:45 executing program 6: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0xfffffcc3, 0x7a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x294f}, 0x0, 0x0, 0xffffffffffffffff, 0x4) r1 = epoll_create1(0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xe, 0x1f, 0xc0, 0x8, 0x0, 0x2, 0x6, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x4040, 0xd40, 0x400, 0x3, 0x6, 0x3, 0x237, 0x0, 0x2fdd, 0x0, 0x2}, 0x0, 0xc, r0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x8000, 0x102) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0xc4, 0x6, 0x3, 0x0, 0x5, 0x46014, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x48000, 0xff, 0x9, 0x8, 0x6, 0xf168, 0x7, 0x0, 0xffffff7f, 0x0, 0x8}, 0x0, 0xb, r2, 0x2) r3 = getpid() r4 = pidfd_open(r3, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000001c0)=0x8000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000000000)) [ 538.483200] loop2: detected capacity change from 0 to 4 13:25:45 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b36, &(0x7f0000000000)={0x1000}) [ 538.504581] EXT4-fs (loop2): unsupported descriptor size 0 13:25:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d", 0x7, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:25:45 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:25:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:25:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:25:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:25:45 executing program 6: perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x7a, 0x0, 0x20, 0x10, 0x0, 0x0, 0x204a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x65dab, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf44f, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xa, 0xffffffffffffffff, 0xa) r0 = epoll_create1(0x0) r1 = getpid() r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x7, 0x1, 0x8, 0x80, 0x0, 0x1, 0x82000, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000000c0), 0x8}, 0x10803, 0x8001, 0x3, 0x6, 0x8000, 0x7, 0x7, 0x0, 0x2, 0x0, 0x3}, r1, 0x7, r2, 0x2) pidfd_open(r1, 0x0) r3 = pidfd_open(r1, 0x0) pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) rt_tgsigqueueinfo(r1, r1, 0x7, &(0x7f0000000040)={0x11, 0x5, 0x3}) 13:25:45 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b36, &(0x7f0000000000)={0x1000}) [ 538.746760] loop2: detected capacity change from 0 to 4 [ 538.764561] EXT4-fs (loop2): unsupported descriptor size 0 13:25:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4", 0xb, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:25:56 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={0x0, 0x4, 0x2}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000480)={r1, 0x3, 0x6, 0x1}) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(0xffffffffffffffff, 0x1) 13:25:56 executing program 7: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:25:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8", 0x10, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:25:56 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0x1000}) 13:25:56 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) r4 = syz_open_dev$hiddev(&(0x7f0000000040), 0x6, 0x80) fcntl$lock(r4, 0x24, &(0x7f0000000080)={0x1, 0x3, 0x1f, 0x6, r2}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/102, 0x66) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000100)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$HIDIOCGPHYS(r5, 0x80404812, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) 13:25:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4", 0xb, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:25:56 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b36, &(0x7f0000000000)={0x1000}) 13:25:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) [ 549.241923] loop2: detected capacity change from 0 to 4 [ 549.269382] EXT4-fs (loop2): unsupported descriptor size 0 13:25:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:25:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4", 0xb, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:25:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:25:56 executing program 7: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:25:56 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b47, &(0x7f0000000000)={0x1000}) 13:25:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:25:56 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) 13:25:56 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={0x0, 0x4, 0x2}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000480)={r1, 0x3, 0x6, 0x1}) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(0xffffffffffffffff, 0x1) 13:25:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8", 0x10, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 549.492262] loop2: detected capacity change from 0 to 4 [ 549.509664] EXT4-fs (loop2): unsupported descriptor size 0 13:26:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:26:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8", 0x10, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:26:05 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) syz_open_procfs(r0, &(0x7f0000000040)='net/ip_vs_stats\x00') r1 = epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) 13:26:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:26:05 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={0x0, 0x4, 0x2}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000480)={r1, 0x3, 0x6, 0x1}) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(0xffffffffffffffff, 0x1) 13:26:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b", 0xd, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:26:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b48, &(0x7f0000000000)={0x1000}) 13:26:05 executing program 7: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:26:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) [ 558.443269] loop2: detected capacity change from 0 to 4 [ 558.465824] EXT4-fs (loop2): unsupported descriptor size 0 13:26:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:26:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b49, &(0x7f0000000000)={0x1000}) 13:26:14 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:26:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b", 0x18, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:26:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:26:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b", 0xd, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:26:14 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000080)={0x0, 0x4, 0x2}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r1, 0x1) [ 567.277099] loop2: detected capacity change from 0 to 4 13:26:14 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:26:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4a, &(0x7f0000000000)={0x1000}) [ 567.322654] EXT4-fs (loop2): unsupported descriptor size 0 13:26:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:26:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:26:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b", 0xd, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:26:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b", 0x18, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:26:14 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:26:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4b, &(0x7f0000000000)={0x1000}) 13:26:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:26:14 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b31, &(0x7f0000000000)={0x1000}) 13:26:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, 0x0, 0x0) [ 567.582989] loop2: detected capacity change from 0 to 4 [ 567.603151] EXT4-fs (loop2): unsupported descriptor size 0 13:26:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x1000}) 13:26:14 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:26:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b", 0x18, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:26:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:26:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:26:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8", 0x1c, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:26:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, 0x0, 0x0) 13:26:25 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b31, &(0x7f0000000000)={0x1000}) 13:26:25 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:26:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4e, &(0x7f0000000000)={0x1000}) [ 578.136920] loop2: detected capacity change from 0 to 4 [ 578.156130] EXT4-fs (loop2): unsupported descriptor size 0 13:26:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, 0x0, 0x0) 13:26:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:26:25 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) 13:26:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100), 0x14) 13:26:25 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b31, &(0x7f0000000000)={0x1000}) 13:26:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:26:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8", 0x1c, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 578.326910] loop2: detected capacity change from 0 to 4 [ 578.334575] EXT4-fs (loop2): unsupported descriptor size 0 13:26:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100), 0x14) 13:26:34 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:26:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:26:34 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b62, &(0x7f0000000000)={0x1000}) 13:26:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8", 0x1c, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:26:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, 0x0) 13:26:34 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) [ 587.947387] loop2: detected capacity change from 0 to 4 13:26:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100), 0x14) [ 587.962851] EXT4-fs (loop2): unsupported descriptor size 0 13:26:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b63, &(0x7f0000000000)={0x1000}) 13:26:35 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:26:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, 0x0) 13:26:35 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/102, 0x66) 13:26:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff80100", 0x1e, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:26:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) [ 588.207278] loop2: detected capacity change from 0 to 4 [ 588.221141] EXT4-fs (loop2): unsupported descriptor size 0 13:26:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:26:35 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:26:35 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/102, 0x66) 13:26:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:26:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff80100", 0x1e, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:26:47 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:26:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b65, &(0x7f0000000000)={0x1000}) 13:26:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, 0x0) 13:26:47 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/102, 0x66) 13:26:47 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:26:47 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f000007a9c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f000007abc0)={0x0, 0x0, "80becdef519ef7f70602a80e2fb58736d90aa995922d7d7b3dcf7cd565a9bd02764dc5a22137920f84e047e05b7613af1d69ba3200bad48efd6bfe8b4065f54b8d8c3dc23b623fd033473a3d1daef9b34cbcabc51887aa68dee0ab30a80e5b5e2f19174ddc7dd15ff0b27a4c60eec5c543a39c0e855166ea00ea4e9eb697a142531b30e8515d6b60f5727104014055cd994641cd9d6611481915e754ba076ffb4794cabda47277c9dcf1a7385545b2363c0883e817097f11b8abe15548e57d885be47426dce51916a715dbdad0ede16d3242f62a6f8173c393c1dcbf600fe7aab6028df985a3efa0b24536cb756f5c1402aec380ee6e6f4e318a03314ec61cb9", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f000007bbc0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f000007cbc0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f000007dbc0)={0x0, 0x0, "6789bf44a7613d8810122f89fdee0c4dbf3079cb93fd200168fb40144259320ec04abbb3655f8c54e1d4702ab7e89e30737d2b5b00214d89539dfd791ee92ca2cd48aff8cde9d7be54c3849a3f978b29c56013654746108edd2bacafe9be7749fcfc8a033d5e272b04a268c2d573a30fd6a35f9daab3fe51e06e79d25b6ef09e89d19dcf4ed0466a606ae5af91766d943d714e8bf280ab3a82b8bd5a68ceccd069596fcc55949e7bfd6d14d7f737a54918f2665148b28bfe61fa5ebb4f3f822b45802db72984c02541655646167e2ba5a3747c7d13f7ff7763d9f4ad9afbc91a1c6463ca1ba6f9277eca9f650b2510987122e9de0e3ef397fd5328213bd8d172", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000007ebc0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000007edc0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f000007efc0)={{0x0, 0x4, 0x4, 0x10000, 0x656, 0x100, 0x7, 0x1, 0x1e, 0xe2, 0x8, 0xab, 0x1f, 0x5, 0x2}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f000007f080)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "98d5951948adfb"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000080080)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000081080)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000082080)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000082280)={{0x0, 0xf5, 0x2, 0x0, 0x3, 0x1, 0x3, 0x6, 0x7f, 0x6, 0x100, 0x460, 0x101, 0xcf3, 0x1b6}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000082340)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000082540)={0x78c8d310, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {r5}, {r6}, {}, {}, {}, {}, {r7}, {r8}, {r9}, {}, {r10}, {r11, r12}, {}, {r13}, {r14}, {r15}, {r16}, {0x0, r17}], 0x3f, "5dd7d3ae99de8a"}) [ 600.461932] loop2: detected capacity change from 0 to 4 13:26:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b72, &(0x7f0000000000)={0x1000}) 13:26:47 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b36, &(0x7f0000000000)={0x1000}) 13:26:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)) [ 600.485627] EXT4-fs (loop2): unsupported descriptor size 0 13:26:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:26:47 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b36, &(0x7f0000000000)={0x1000}) 13:26:47 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) sendfile(r1, r0, &(0x7f0000000140), 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in=@local, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) r2 = epoll_create1(0x0) r3 = getpid() io_cancel(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x5, 0xffffffffffffffff, &(0x7f0000000040)="dc3f01e3e8b761624c1a5934158e84cbdd04a0f40e613bdf158135bd1efffb00c4c49abaf0c4da07f3fea5b8090c10a0978be1e1b66e69267cad4fc21e0df944d23b521d3b9e07d5d4305dc296bf66846fe387", 0x53, 0x2, 0x0, 0x2}, &(0x7f0000000100)) r4 = pidfd_open(r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000000000)) 13:26:47 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, 0x0, 0x0) 13:26:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:26:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff80100", 0x1e, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:26:47 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b36, &(0x7f0000000000)={0x1000}) [ 600.728008] loop2: detected capacity change from 0 to 4 [ 600.744325] EXT4-fs (loop2): unsupported descriptor size 0 13:26:58 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4bfa, &(0x7f0000000000)={0x1000}) 13:26:58 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, 0x0, 0x0) 13:26:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:26:58 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x3, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x401}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x1a) r0 = epoll_create1(0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x81, 0x7f, 0x8, 0x20, 0x0, 0x8, 0x87108, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4a6b, 0x0, @perf_config_ext={0x24f, 0x4}, 0x1000, 0x1, 0x40, 0x4, 0x7fffffff, 0xf282, 0x1, 0x0, 0x9, 0x0, 0xdb0}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) r2 = getpid() pidfd_open(r2, 0x0) pidfd_open(r2, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) r4 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000000)={0x40000000}) 13:26:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:26:58 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:26:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, 0x0) 13:26:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f}], 0x0, &(0x7f0000012e00)) [ 611.868209] loop2: detected capacity change from 0 to 4 [ 611.906796] EXT4-fs (loop2): unsupported descriptor size 0 13:26:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, 0x0) 13:26:59 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4bfb, &(0x7f0000000000)={0x1000}) 13:26:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:26:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f}], 0x0, &(0x7f0000012e00)) 13:26:59 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, 0x0, 0x0) 13:26:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:26:59 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x492101, 0x182) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) r5 = perf_event_open$cgroup(&(0x7f0000003ec0)={0x5, 0x80, 0x1, 0x9, 0x1f, 0x9, 0x0, 0x8, 0x80, 0xd, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000002c0)}, 0x22, 0x100000001, 0x4, 0x2, 0x7, 0x1, 0x3f4, 0x0, 0x551, 0x0, 0x80000001}, 0xffffffffffffffff, 0x9, r0, 0x5) r6 = openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003f40), 0x2, 0x0) clock_gettime(0x0, &(0x7f0000003fc0)={0x0, 0x0}) ppoll(&(0x7f0000003f80)=[{r3, 0x1610}, {r4, 0x5}, {r3, 0x2540}, {r5, 0x1020}, {r6, 0xc000}], 0x5, &(0x7f0000004000)={r7, r8+10000000}, &(0x7f0000004040)={[0x6]}, 0x8) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r9, &(0x7f0000000040)=""/102, 0x66) copy_file_range(r2, &(0x7f0000000040)=0x8, r9, &(0x7f00000000c0)=0x41b9, 0x20c2, 0x0) r10 = getpid() r11 = syz_io_uring_complete(0x0) recvmmsg(r11, &(0x7f0000003c80)=[{{&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)=""/75, 0x4b}], 0x1}, 0x5}, {{&(0x7f0000000240)=@phonet, 0x80, &(0x7f00000002c0), 0x0, &(0x7f00000003c0)=""/183, 0xb7}, 0x6}, {{&(0x7f0000000480)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000300)=""/5, 0x5}], 0x1}, 0x4}, {{&(0x7f0000000540)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/157, 0x9d}], 0x1, &(0x7f00000006c0)=""/229, 0xe5}, 0x8}, {{&(0x7f00000007c0)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000840)=""/131, 0x83}, {&(0x7f0000000900)=""/13, 0xd}, {&(0x7f0000000940)=""/98, 0x62}, {&(0x7f00000009c0)=""/124, 0x7c}], 0x4, &(0x7f0000000a80)=""/75, 0x4b}, 0x6}, {{&(0x7f0000000b00)=@un=@abs, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000b80)=""/35, 0x23}, {&(0x7f0000000bc0)=""/2, 0x2}, {&(0x7f0000000c00)=""/15, 0xf}, {&(0x7f0000000c40)=""/12, 0xc}, {&(0x7f0000000c80)=""/55, 0x37}, {&(0x7f0000000cc0)=""/33, 0x21}], 0x6, &(0x7f0000000d80)=""/182, 0xb6}, 0x6}, {{&(0x7f0000000e40)=@alg, 0x80, &(0x7f0000001480)=[{&(0x7f0000000ec0)=""/184, 0xb8}, {&(0x7f0000000f80)=""/140, 0x8c}, {&(0x7f0000001040)=""/175, 0xaf}, {&(0x7f0000001100)=""/149, 0x95}, {&(0x7f00000011c0)=""/199, 0xc7}, {&(0x7f00000012c0)=""/63, 0x3f}, {&(0x7f0000001300)=""/187, 0xbb}, {&(0x7f00000013c0)=""/161, 0xa1}], 0x8, &(0x7f0000001500)=""/138, 0x8a}, 0x9}, {{&(0x7f00000015c0)=@x25, 0x80, &(0x7f0000001900)=[{&(0x7f0000001640)=""/241, 0xf1}, {&(0x7f0000001740)=""/171, 0xab}, {&(0x7f0000001800)=""/247, 0xf7}], 0x3, &(0x7f0000001940)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000002940)=@x25, 0x80, &(0x7f0000003b40)=[{&(0x7f00000029c0)=""/143, 0x8f}, {&(0x7f0000002a80)=""/141, 0x8d}, {&(0x7f0000002b40)=""/4096, 0x1000}], 0x3, &(0x7f0000003b80)=""/242, 0xf2}, 0x9}], 0x9, 0x60, 0x0) listen(r12, 0x17) r13 = pidfd_open(r10, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r13, &(0x7f0000000000)) [ 612.116868] loop2: detected capacity change from 0 to 4 [ 612.146734] EXT4-fs (loop2): unsupported descriptor size 0 13:26:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, 0x0) 13:26:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:26:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f}], 0x0, &(0x7f0000012e00)) [ 612.372231] loop2: detected capacity change from 0 to 4 [ 612.387747] EXT4-fs (loop2): unsupported descriptor size 0 13:27:11 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:27:11 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5409, &(0x7f0000000000)={0x1000}) 13:27:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:27:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:27:11 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b48, &(0x7f0000000000)={0x1000}) 13:27:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:27:11 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) r3 = gettid() ptrace$setregset(0x4205, r3, 0x4, &(0x7f0000000080)={&(0x7f0000000040)="2e03be1249474a0a81839a4a09d97d7142318909a7299a8d", 0x18}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:27:11 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x492101, 0x182) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) r5 = perf_event_open$cgroup(&(0x7f0000003ec0)={0x5, 0x80, 0x1, 0x9, 0x1f, 0x9, 0x0, 0x8, 0x80, 0xd, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000002c0)}, 0x22, 0x100000001, 0x4, 0x2, 0x7, 0x1, 0x3f4, 0x0, 0x551, 0x0, 0x80000001}, 0xffffffffffffffff, 0x9, r0, 0x5) r6 = openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000003f40), 0x2, 0x0) clock_gettime(0x0, &(0x7f0000003fc0)={0x0, 0x0}) ppoll(&(0x7f0000003f80)=[{r3, 0x1610}, {r4, 0x5}, {r3, 0x2540}, {r5, 0x1020}, {r6, 0xc000}], 0x5, &(0x7f0000004000)={r7, r8+10000000}, &(0x7f0000004040)={[0x6]}, 0x8) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r9, &(0x7f0000000040)=""/102, 0x66) copy_file_range(r2, &(0x7f0000000040)=0x8, r9, &(0x7f00000000c0)=0x41b9, 0x20c2, 0x0) r10 = getpid() r11 = syz_io_uring_complete(0x0) recvmmsg(r11, &(0x7f0000003c80)=[{{&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)=""/75, 0x4b}], 0x1}, 0x5}, {{&(0x7f0000000240)=@phonet, 0x80, &(0x7f00000002c0), 0x0, &(0x7f00000003c0)=""/183, 0xb7}, 0x6}, {{&(0x7f0000000480)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000300)=""/5, 0x5}], 0x1}, 0x4}, {{&(0x7f0000000540)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/157, 0x9d}], 0x1, &(0x7f00000006c0)=""/229, 0xe5}, 0x8}, {{&(0x7f00000007c0)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000840)=""/131, 0x83}, {&(0x7f0000000900)=""/13, 0xd}, {&(0x7f0000000940)=""/98, 0x62}, {&(0x7f00000009c0)=""/124, 0x7c}], 0x4, &(0x7f0000000a80)=""/75, 0x4b}, 0x6}, {{&(0x7f0000000b00)=@un=@abs, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000b80)=""/35, 0x23}, {&(0x7f0000000bc0)=""/2, 0x2}, {&(0x7f0000000c00)=""/15, 0xf}, {&(0x7f0000000c40)=""/12, 0xc}, {&(0x7f0000000c80)=""/55, 0x37}, {&(0x7f0000000cc0)=""/33, 0x21}], 0x6, &(0x7f0000000d80)=""/182, 0xb6}, 0x6}, {{&(0x7f0000000e40)=@alg, 0x80, &(0x7f0000001480)=[{&(0x7f0000000ec0)=""/184, 0xb8}, {&(0x7f0000000f80)=""/140, 0x8c}, {&(0x7f0000001040)=""/175, 0xaf}, {&(0x7f0000001100)=""/149, 0x95}, {&(0x7f00000011c0)=""/199, 0xc7}, {&(0x7f00000012c0)=""/63, 0x3f}, {&(0x7f0000001300)=""/187, 0xbb}, {&(0x7f00000013c0)=""/161, 0xa1}], 0x8, &(0x7f0000001500)=""/138, 0x8a}, 0x9}, {{&(0x7f00000015c0)=@x25, 0x80, &(0x7f0000001900)=[{&(0x7f0000001640)=""/241, 0xf1}, {&(0x7f0000001740)=""/171, 0xab}, {&(0x7f0000001800)=""/247, 0xf7}], 0x3, &(0x7f0000001940)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000002940)=@x25, 0x80, &(0x7f0000003b40)=[{&(0x7f00000029c0)=""/143, 0x8f}, {&(0x7f0000002a80)=""/141, 0x8d}, {&(0x7f0000002b40)=""/4096, 0x1000}], 0x3, &(0x7f0000003b80)=""/242, 0xf2}, 0x9}], 0x9, 0x60, 0x0) listen(r12, 0x17) r13 = pidfd_open(r10, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r13, &(0x7f0000000000)) [ 624.569016] loop2: detected capacity change from 0 to 4 [ 624.601928] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:27:11 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4", 0xb, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) 13:27:11 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x50000000}) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:27:11 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540b, &(0x7f0000000000)={0x1000}) 13:27:23 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:27:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:27:23 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540c, &(0x7f0000000000)={0x1000}) 13:27:23 executing program 5: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)={0x1000}) 13:27:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:27:23 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:27:23 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f0000000040)={0x20000000}) r4 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000000000)) 13:27:23 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:27:23 executing program 5: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)={0x1000}) [ 636.419101] loop2: detected capacity change from 0 to 4 13:27:23 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:27:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b52, &(0x7f0000000000)={0x1000}) [ 636.443118] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:27:23 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:27:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b52, &(0x7f0000000000)={0x1000}) [ 636.534088] loop2: detected capacity change from 0 to 4 13:27:23 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540d, &(0x7f0000000000)={0x1000}) [ 636.555064] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b52, &(0x7f0000000000)={0x1000}) 13:27:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540e, &(0x7f0000000000)={0x1000}) 13:27:36 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:27:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:27:36 executing program 6: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/108, 0x6c}, {&(0x7f0000000140)=""/7, 0x7}, {&(0x7f0000000180)=""/239, 0xef}, {&(0x7f0000000280)=""/59, 0x3b}, {&(0x7f00000002c0)=""/6, 0x6}], 0x5, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x140}, 0x2000) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x3) r3 = epoll_create1(0x0) r4 = getpid() r5 = pidfd_open(r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000000)) lseek(r2, 0x800, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f00000006c0)={0x1, 0x0, 0x1000, 0xde, &(0x7f0000000580)="ac96ba66a298a8662d1fb1ca161119ff85898cc1fb5edaa52bf2bf116a55435b815e088e5b06bd977bb810b232190e065f89ef9f6d84fd23fab8d13dc7972692796474b1455755bde3dbe98cb410b78fa9344a5f43f175c24c6a00d8306bcaa9fdde5d420e4f24b8ed008ce70299d528bf6136483d4f926f80e26e3bc22e615d6f06528ddb947cb13185ba46e477e9f6cc542c458dbe9d2ee27815dae23be1d7870f6969caff87d749c9952175b4196dda5d8cbf77d059a2e917ba53b2045fc6d6de5894f01eec5c7005d0f24038c46daf0c2705f8dd6b9c2056fa5cddfd", 0x34, 0x0, &(0x7f0000000680)="5018b6eaa7a2c09a57061214f241a74add056876fbc89bda48f6c0dd55fbbc6825b2476430ebe5b970d012d29bccc4ad615bcc98"}) 13:27:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:27:36 executing program 5: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)={0x1000}) 13:27:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:27:36 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) [ 649.232197] loop2: detected capacity change from 0 to 4 [ 649.249131] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:36 executing program 6: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/block/loop1', 0x101000, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x60003, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000100), 0xc}, 0x0, 0x100000000000000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x0, r0, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = getpid() ptrace(0x8, r3) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)={0x2005}) epoll_pwait2(r4, &(0x7f0000000280), 0x0, &(0x7f0000000200), &(0x7f0000000180)={[0x7f]}, 0x8) r5 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r5, &(0x7f0000000000)) 13:27:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:27:36 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:27:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:27:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:27:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:27:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540f, &(0x7f0000000000)={0x1000}) [ 649.454771] loop2: detected capacity change from 0 to 4 [ 649.479133] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:36 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x412400, 0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:27:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 649.688002] loop2: detected capacity change from 0 to 4 [ 649.694775] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:27:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:27:47 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:27:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:27:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:27:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5410, &(0x7f0000000000)={0x1000}) 13:27:47 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:27:47 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) 13:27:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:27:47 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) [ 660.359521] loop2: detected capacity change from 0 to 4 [ 660.368039] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:27:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:27:47 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:27:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5412, &(0x7f0000000000)={0x1000}) [ 660.545298] loop2: detected capacity change from 0 to 4 [ 660.554151] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:57 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0xdc9b5d3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @dev}, &(0x7f00000001c0)=0x80) fcntl$setstatus(r0, 0x4, 0x4400) write$binfmt_aout(r0, &(0x7f00000003c0)={{0x108, 0xfa, 0x5, 0x2b, 0x228, 0x8, 0x290, 0x101}, "15189cefccf347cb03e3b3c3f7238f8c502988fb6ce3be23672db80cd159e0adec9251017b61c44d267d1dee2fce2e93c764e6359ee5", ['\x00', '\x00']}, 0x256) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000140)={0x7, 0x7, 0x2}, &(0x7f0000000180)=0x28) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) sendmsg$NL80211_CMD_RELOAD_REGDB(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x800, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004800}, 0x40000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth1_to_bond\x00'}) r2 = epoll_create1(0x0) r3 = getpid() pidfd_open(r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f0000000000)={0x20000000}) 13:27:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:27:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:27:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:27:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:27:57 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:27:57 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5413, &(0x7f0000000000)={0x1000}) 13:27:57 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)={0x1000}) [ 670.091714] loop2: detected capacity change from 0 to 4 [ 670.100344] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:57 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:27:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:27:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:27:57 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:27:57 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x5}, 0x4002, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) r1 = epoll_create1(0x0) getpid() epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) 13:27:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:27:57 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)={0x1000}) [ 670.362782] loop2: detected capacity change from 0 to 4 [ 670.383850] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:27:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:27:57 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:27:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:28:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:28:10 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) ioctl$FICLONE(r0, 0x40049409, r0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x10000000}) r3 = getpid() r4 = pidfd_open(r3, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x200, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x2f, 0x8, 0x9, 0x89a7, 0x4, @empty, @remote, 0x8000, 0x1, 0x8001, 0x7}}) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f0000000200)={@private0, @remote, @dev={0xfe, 0x80, '\x00', 0x2f}, 0x9, 0x8000, 0x6, 0x100, 0x9, 0x10110, r6}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000000040)) 13:28:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:28:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:28:10 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)={0x1000}) 13:28:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:28:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:28:10 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5415, &(0x7f0000000000)={0x1000}) 13:28:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:28:10 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5416, &(0x7f0000000000)={0x1000}) [ 683.194673] loop2: detected capacity change from 0 to 4 [ 683.213082] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:28:10 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:28:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:28:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:28:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:28:10 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5418, &(0x7f0000000000)={0x1000}) 13:28:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 683.447782] loop2: detected capacity change from 0 to 4 [ 683.466634] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:28:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:28:21 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:28:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:28:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:28:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:28:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541b, &(0x7f0000000000)={0x1000}) 13:28:21 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:28:21 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) pidfd_open(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000080)=0xc5d) [ 694.718407] loop2: detected capacity change from 0 to 4 [ 694.744561] EXT4-fs (loop2): invalid first ino: 0 13:28:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:28:21 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:28:21 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:28:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541d, &(0x7f0000000000)={0x1000}) 13:28:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:28:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:28:21 executing program 6: perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa6cb75bbb56c96d4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000080)={0x40000000}) r4 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)) [ 694.959839] loop2: detected capacity change from 0 to 4 [ 694.983422] EXT4-fs (loop2): invalid first ino: 0 13:28:22 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)={0x1000}) 13:28:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541e, &(0x7f0000000000)={0x1000}) 13:28:32 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x141000, 0x0) 13:28:32 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:28:32 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:28:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:28:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:28:32 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)={0x1000}) 13:28:32 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541e, &(0x7f0000000000)={0x1000}) 13:28:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:28:32 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:28:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) [ 705.237790] loop2: detected capacity change from 0 to 4 [ 705.254514] EXT4-fs (loop2): invalid first ino: 0 13:28:32 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:28:32 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:28:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:28:32 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5421, &(0x7f0000000000)={0x1000}) [ 705.419421] loop2: detected capacity change from 0 to 4 [ 705.430959] EXT4-fs (loop2): invalid inodes per group: 0 [ 705.430959] 13:28:45 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b52, &(0x7f0000000000)={0x1000}) 13:28:45 executing program 6: fcntl$getown(0xffffffffffffffff, 0x9) r0 = epoll_create1(0x0) r1 = getpid() r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) r4 = getpid() r5 = pidfd_open(r4, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r5, &(0x7f0000000040)={r0, r3, 0x8001}) r6 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r7 = epoll_create1(0x0) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x44200, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000140)={0x2004}) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r9, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r9, &(0x7f00000000c0)) r10 = getpid() r11 = pidfd_open(r10, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r11, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f0000000040)={0x3000001b}) 13:28:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:28:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000100", 0x4e, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:28:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:28:45 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:28:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5422, &(0x7f0000000000)={0x1000}) 13:28:45 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)={0x1000}) [ 718.231649] loop2: detected capacity change from 0 to 4 [ 718.256767] EXT4-fs (loop2): invalid first ino: 0 13:28:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, 0x0) 13:28:45 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b52, &(0x7f0000000000)={0x1000}) 13:28:45 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:28:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:28:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5423, &(0x7f0000000000)={0x1000}) 13:28:45 executing program 6: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/workqueue', 0x10001, 0x8) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req={0x2, 0x1, 0x2, 0x100}, 0x10) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) r5 = fcntl$getown(r4, 0x9) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0xff, 0x9, 0x38, 0x0, 0x9, 0x2980, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x2, 0x400}, 0x2311, 0x7, 0x934e, 0x0, 0xffff, 0x3, 0x0, 0x0, 0x745, 0x0, 0x7}, r5, 0x4, r1, 0x3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000000000)) 13:28:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000100", 0x4e, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:28:45 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:28:45 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b52, &(0x7f0000000000)={0x1000}) 13:28:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, 0x0) [ 718.565161] loop2: detected capacity change from 0 to 4 [ 718.603355] EXT4-fs (loop2): invalid first ino: 0 13:28:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:28:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:28:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, 0x0) 13:28:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000100", 0x4e, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:28:57 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5424, &(0x7f0000000000)={0x1000}) 13:28:57 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) syz_open_dev$tty20(0xc, 0x4, 0x1) 13:28:57 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:28:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, 0x0) 13:28:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, 0x0) 13:28:57 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5425, &(0x7f0000000000)={0x1000}) [ 730.855271] loop2: detected capacity change from 0 to 4 [ 730.875593] EXT4-fs (loop2): invalid first ino: 0 13:28:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:28:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)) 13:28:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:28:57 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:28:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, 0x0) [ 731.067695] loop2: detected capacity change from 0 to 4 [ 731.086710] EXT4-fs (loop2): invalid first ino: 0 13:29:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:29:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:29:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:29:09 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@private2}}, &(0x7f0000000200)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}, {@dfltuid={'dfltuid', 0x3d, r1}}], [{@fsname}, {@fsname}]}}) r2 = epoll_create1(0x0) r3 = getpid() r4 = pidfd_open(r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000000000)) 13:29:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)) 13:29:09 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:29:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5427, &(0x7f0000000000)={0x1000}) 13:29:09 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:29:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5428, &(0x7f0000000000)={0x1000}) 13:29:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) [ 742.087872] loop2: detected capacity change from 0 to 4 [ 742.108744] EXT4-fs (loop2): invalid first ino: 0 13:29:09 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:29:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:29:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)) 13:29:09 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x2062) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x5, 0x8, 0x8, 0x20, 0x0, 0x9, 0x40, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x1, @perf_bp={&(0x7f0000000000), 0xe}, 0x10, 0x5, 0x0, 0x3, 0xfffffffffffffffc, 0x8, 0x7, 0x0, 0x9, 0x0, 0xe8}, r1, 0x1, r0, 0x3) socketpair(0x1, 0x3, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000080)="84fccf0abd35e2ff0d320037483c955eceb08f4922ec5dcb21f09ecb106a9cf1e619522c26d6c16127ee54dce08f9cacd13a46bff55ab455eeb8a9bd9caa736a6bfce0a6540759b2ac88e29661a28a343392a64071d3650712d47011d40db9b4de525b4639dcd70d76e2713fd88616c521c3c533ef3501501913c12af5d6de0593529246b91b7ab5cfad45cc55ca48c9f0f89888bdd5bbcda6a4d9209cbab744130348eb806bd39edf79d19d31ea263d85bef01640879ac3c519cd02806f2db012302cc429d7c759021e0519570c1338e838b0bb6c16a841830a3459b923b7dd550d9305687d14f244a64129bccffb", 0xef) r4 = epoll_create1(0x0) sendmsg$AUDIT_SIGNAL_INFO(r4, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbff, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x488c0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/102, 0x66) sendfile(r5, r2, &(0x7f0000000180)=0x6, 0x8) r6 = getpid() pidfd_open(r6, 0x0) 13:29:09 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:29:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:29:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5429, &(0x7f0000000000)={0x1000}) 13:29:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000100000000000000", 0x54, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:29:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) [ 742.329321] loop2: detected capacity change from 0 to 4 13:29:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) [ 742.355873] EXT4-fs (loop2): invalid first ino: 0 13:29:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5437, &(0x7f0000000000)={0x1000}) 13:29:09 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:29:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)) 13:29:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:29:19 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:29:19 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, 0x0) 13:29:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:29:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5441, &(0x7f0000000000)={0x1000}) 13:29:19 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0xc3e, 0x492f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) pwritev2(r2, &(0x7f0000000240)=[{&(0x7f0000000040)="9e41015c71f6d4aece9ab7e1985893b10cb4ce42f34669151323228ce70789c387049a0204fc00bceca2897a9b8efadd82c14bc1b32a614fa8f5f807a2b7bf9117d2ea2479f354730845ded8cad4df5d788a934198641abe65bc5052346449d16539e923c9d30094b197a67af683e7f87a8372bd669f2b548d90b7319777328ba618b24b57a299c09b14fdf5f6a478f33c4f31013d170ef334d1bede8132ad5f48697394e3409f31dabd7039475df42cb96790d1d449", 0xb6}, {&(0x7f0000000100)="098a8caa5e84bf7b", 0x8}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000140)="194e019913825e38e34772419642bbf1719c9c14e49a67c6b48ed180e45f8b546ef58ffec283dcf603ef2e48e84787b79b4ce48d62c5fd9ef90107b00f55c3bceccc6fc903ab455a50695797e49b876ef46be9c6bc109fe156f5f1bc426ba32b05316dd050b730dcdead5963062667ad350eaca092da12da9902e6dc51c8909fc6c0ab2e4a594cd5fdb270d28e871a", 0x8f}, {&(0x7f0000000200)="e409749b67569f7240251c8495db27b32cbcb2cee5bec50cfc0456afc2efd3aac69f7037502ff0f4e6", 0x29}, {&(0x7f00000013c0)="acdcc4a7408f2ff6ed32b3d70131dec5764152a334e4a682295be1d934b7472b78bf8ebc936c08802f7f88b18832629299b8aa57a1a4a5dee28814022efda10d1648bae6c21aec6421db4a2dfea2765315e4b5476ba05465b8c5b5481466a8f0072ea77f3f38e32df7d329418f2ae9cc07aea9c9c2fed59b7e10535100a9f24e66add633b1ee40350ef759b19e9afbec732ef99538f75c265205ddeb466c4c2c852421c64802134747e74accade7f1fc87a356c0b4ef37b877fff2108a5b087c479d5ca8ccb9fefb1f2c88fcea1ac709dd2844d0f798e9e97aa716e3f643655e35bcc54419cf5f3bda1be9b331338f267caac6ed21edb4e0097eac76e88c2a758a72b79c51e351d43aa0b0e80defa7dfc170ca24e7fa2f9f6cc08616d903ef015516787f2ab8c4642697d226109c6ab8918db6a8066f6581fab57b3332af5cfacab2c7c906428870b2ec5d3964dba3cba284df27a01b5e6a3334071f771b31362b998051e1694dcd1ff1ef7c66a0a39e0f08a9fa214f85d8a8c1064e3cd45f0ebe7ef68ce6ce5e32c8a3d1c2314f6dcec0de7c985248592aaccda1b1867d90717c8d7dfb2f4c7abb5f364d502ddcae071df7c1bddb2c9d7b0dfb751c4c92477d51f699e6be777214af7aef215873a39033e3e940352e7ffc9a182d8fadfa708bc6c9f5b499fa442f44ca116e7bdbdeedcc2927ae0ad6e0ff1d3111db6f749f325282dc33be71a4e5bde72c06d9eeb39222c081633ce3be63aed3a396c55eb7387f8731755332547b756972f6e9688b0935513f5d889f542bbbc60a134c2c20ff93b841e264b93e4a3fc0c17837885e1fe99e5c8e68777ad9a0a3e0438db99c50a7672b1fb7d0114b9ce70b085055e1a7787d3cb53687ec772901cb2334adcc1c5d9ec43d6629cfb45831728f819e67f9c669d697318bad40bbdda6ffbfd35d83177bc53eb33ead7b06f6fba054fdd1a65632d5e89b83b13381157e62b6d6ccb635c47600f6bf5a954e373d0546365e4e2bfac05ce49412f12402cbf0ca4ac1093d0a179b2f76648df4f4c9cc29a9e7e3b9bf5e2eabf521973522b657dac7076411edf06fb11e1d27e668febec2617127d6a8429123f52a1be5aff7b661e26bfa2f7f694d1d3bdfdd9036d08db18c689461c457280e3c1cce238b4d69394ec6c1c5fb95592ce8da2f47a57a3b47db539daa5aa562cf199947c9eb36aa0462fee992a13aad72ba4bb479508bed3335985ec1728b1319e6707e0c22fde50c3f5736bef0fd666dfaeb130efb27dbc09e665da91346cbadccabca6ad464a43edd9931ab8e32dcd9bafc5f2d19170bdb639eff08f6a3655a12a9e0af0d1573bb8534fc3fd684b652e951d1247091e5025a74dcbedfbf984f7b970256558579daa5441dcd2287a62a43c7db95f6c4fc3f371982e7b9a269e489a1105b95a55049ba1b637136ba8e7a25b181cd8272e33389ce255bd2abcb9b4f9a2b235c844b5109dfc21d6f8f01089609d996d4d14f2a04729fde19bf9f7c9c3879f6bdc67d8821182e5e5678f123526b609834fac844183b92eaeda9a02f0ce7f8605880eaafe60ea51f868e64d474ff572ff6f21098b7f421aa14057791301dfa871de6514cea6d18e5f3e7de456d62e5e87f19e74d97498d87fd4d8505c126a7d9180f7307e19ef915ebf6ab84eb17ea8b2b4c9c2d9dfd82d0071d9b5353939c020d5da4c477b4466633155a366b5d46c7ba1566c99d2cac7a7b8cba3d3e617ad2f094c693ce76d17b831c25c21f30f033c9e40718419e0b87a3b9b932d78482b83cf684cf9cbb31fdacf856a89204a7075636f94d1b607196461f56122c5832964ce429ba003f04ead2d3a18af5e4e9626061ca81b0580bbdddcb74951a882edb61c49b9aeb0db0a9f5b5ef15e02a2c6dc08aef266f05d1eebd8523e744e9a0824f8bd48f4b7c4d80db5c5bbf4d33ce605f16424c200de44e6217b259fe90e40626ad53f304b224a0136122b3710eae3158ab98ddb57fcedc3d1cf61b613b857135e8523613580e881d57796ee0f16d4c5454564f5b7e4854bb4dc6c51e33e1d6c1d551ff2b8690240bb58f559f070dec8efa90d95dd675b8f2462f40a7ea6969c59f21a621d4ea9c77e1fab429517076facb5564f92b20e5c14fc9f16de99ac4986d23e4b1734a99ba8092732e36b19ccf47d1e86e9cc327a01252685273b3b51dcaf27e82179f471afc714063fd7da32831e6842edcfee3a96a221d22f83b3ee8da3c70c5cd252d4483f6b75cf51e25a05e04d3b46df46a4c5f9a78b6f085c21211d4a941d37608a94bff4998c5b722f533bf5e5e70d7202ba6f8aa5978562ae4aa674c2be32b54dd63204863d726b9d776d75766a3903e60b2ddbeebea056cf7d533b9f5e4dd25542f3f4887c1d4ba6bfe2c6b71a643fb32be878556d852c5cc3e043d5d009ecee21f213ac47662d7c8d26e09f44c30a4298247c0739a8f2ad3df477b4775bb68a0d18c9ca38cd2e882acecb9efae5ce8e9fde7bcdad02a89856ed33603f3410bdc6dd4b5095874c611359bc0e2344451b755d4e606ca39bef9730b499db503f73dfa49bec6983a6dca83938fab2e921bd4d43ab0a2ddd06e37efc4b5fa00578200ce2d414d132c0423eff37d0fd154c8e6feb5cd3cdfad5a1b252ea08fe56ba162a2072c7c5ef8dbf80c5eef0ab269bd28005d2ca2ca5c04071eedc09e625aa9f3cd31ee8e42dbb78cae2c17a436a0082052f83ad192b3887d7311c364164d86f34fc7bee81758c5f6e7fca2bfc7d29bab7816833227442346408e78e7bf261f588d7dd4b92438b1db0f8a254b414f00e6947920cba97c89841bc573bc18ed43054b36b8ce22cbe7d66bbdfcfa1652f98497ededd828fd08d1d5e20012fe377940636bc7ad481c7edddbbd2fb54b47fd59a233f2e8ea2f369c6334c74672584f0746ab73ee13b7c7b9894d681f126ef63e6c3bf0a83001000dec2ab46396ca0afdce8963011254cb3a8d53bee11be519d1c9c09b2be8d8c57246d4a5f0596b0e487971e304ed7b7da1ec0e9c3d530d0bb4b40b5a9f2f1315a5ea8be107aafa83ba9a40c02a206d8536eea31b9c9d45031416ea54e7c981c392c81ff2e5c964e58c160a5430efb753e68247c530598099e58dc77eae6ed96bd6ca913e7536d07be6abc2ae49ea4a3957059eece9bee051c55038d74d104e1c5c435bb60876962d6406ddddf7f16254ff5b732b174d574df6e30a21a3d48ec3bd0925b3e0d83ba728c4df74afade26906fe4054a656f96938c7e9c1a0ff0de9bde1191b2f541a2a1d7bdcf8684bc1f8080b6d2814761681d24e061f0d7d3e8aa7000494dedb7b0ec7ca09de7c7b1984adf9a61963bf7eb407e48a64342c9cd9390dc357b12327c287a57fc9f3a0afeafa0d06b6d934ab22641d5f77ae3dac74f0ac36ab52404a4a06fd73d1f2da9dde99397a360f99c5cf58f44ae39efa8ea574faa39d1bf41f45d24258386713cea4b385462ec33a924ae341e44633de49d2781523d6ab9cfbe33cedb944dca64ad17735b99bf1dff3f87c43d76478a6ee525844c53d4f4468d31ff73ec71a28c8dbcb885bffeda87fb67f5c41ae6fab7ae0c8111ed74264d34a9cbda1f338fb9984abb9ace57bb373e7203e48129cf4d128a995762714cc7552f7b59ca3e6d8b0e9f84806645c7e5401be969ca7a1e5d44614ce7e294001ba1ccd0806d541d96514f664fdffaa31d500a5b5b8e1077a83ea5990f9b9179a39bf1873ac37ac50ab79b5f73d79a2f9208164bb9868b422d74b4d2ed44d293284b26810904d8b650565fe3d1556bdc03788b642ed1b02f4daaacbc3edddccdaa3c29de2584bf6f3c6c832c8b985b9010ef00f93dd832140d940eb872a36882e49dbc45425e833ae5beabf86b2602ab8a8af9747475974f0bcf0bc0216c145eb62ad92bc040185e62b2440fb6062da95487cea0a4c25919beb5aa4eb7a40c9518e0bcd89b1729d26fe61620fd74f31c3fdb8d8643c50611267704f3cf7221b4b2f5992e2ed91fce72d282e488160e6f41e3ba22f8ce9b335f50c2c53fe0edbf3abb8079b749499043ad4a187f99577974eb000d829a9a9cf9d221e1c18ddd7e6d8fec48529688ee9e48ae89ae59f0f1103718601354c36ba3a685bcf126ccdbd233efc41b301b3761adf57bb56e9c43fb456006f2f9ecbcaf0ac6602d1f43239cffe53c02069971b7888a471dc509d4b8eaba728478c7892cdffd6f61f6aa8e0c396968f5dd024d02ad34df23e046b3350adf823ccd325df234c97f63104a17403aeac0a19393311ce55293639255a0bbbbba2dca0a3fc138ba01fe3997c57f9db1abf4242b4395f409fdfea193d7a5b9b714cb1cfe550e7f9777685e682eb2ca63aa592a819f7abe3dfa509d8e8010f43ab9d69476537eb39866cf386d1a44fc83d33e1f7a6117b10c1958853ebb75aaa2b15494ae33f13e502e5c05e3cfa4ae2eb6ea1cb62a5435448dccb0193904acdf93d0c98c55c5f128e1f5fc2f96c8563fb2722a51b25e7a332b062336feb22bee1d599e854e688bc2faed6e597ea7e5c815f0745717830dfe71163017c26073975b30ca128e41b05d2199e2af4ead70aa71e535ff3dd230c82f7136fc263c96128512ef711f3fb1c7802223f6836efe5b9bd887158392a442189ad4cefc4d8fdbaf199261b2d0ebc991816140500fecd589dfa289696c2dcbd68d868527d66eaeaae9cc663f4129f2c270a20a26cc33660c672990393acd2b8fe28e6103b94db3e82edeb1d09b39ba0e2bcca1dd464bdd568a26bcd4c630f7981cc566066ecccb3477f078842fdd6b4ac0fc81c3c466577b4c6bbe80a3d744812bd108ffff703ba4fabf22d740db3a384d4ed1ddebfa460dc2a9e95ad8a8740d6a1bfa8ee8ac0062bb40c58501af4d085af710e6397dbc67d492d8259215c5db6a86c5c2f392f5c5a88b0ee401553fe032940d962ff05fefadd743011c8a5ee6cfe3d3a05ee4890a953a096ae178c67520a803c7f86075e69042fab870edb7433580b04a8ea46e629ed273d2329d7aa235ba27e2993d7517a1203be36a697600bf567b1508ea97581e486a02863c2b2b38743113341fc807a0b6dea341ee6ed1e650e8cd5bc712e839345bfe2b7f86aaf302d87853e4388499b261f2ed709c5d61be125298f1f5fb2084668e0d7032f5d1b48ad5a41078bf58a3341e8839cb69ec64d4377d8b8b22884ab0bcf03b5ebcef940fcbca532a94df8c4ead958ec58ad5dbdef2d216a42c92490d680e610f4345d7263f7b7c7f3e8225b1dd460db8958d99a29680dc2f00fc72c6c963e23421e15e466a711249efe25eb5632955e2fc905bcd12430f8430b93a3d18f2456c54d2ef8a9bf69ea70b34e6ec57d51493dca85796b5f3d68dcf752591633433d894a18f0f683046ca5ed6e5e9f6d0310e80e25d8c88662088b5d1b3ae8d93c78b0fe36e952885b36c8c9e1d864c434e6bac52349a7da956a4eae721d60e65196e8105ece447bbb762fb7f5ec7fea27d88217fb1ff26083f8342170b7542deb7122dbea21e123f6e8bd5ada9edd2bbc956c08c56ec614452cb627bbee275487afc3c0bf68ba07ae387e24c2873fb8a2bcb314b40a7b9097e3b4963815cd9e75f8cf15777a9154eaf7d2e535f1dc39905f92c18bbdd850c46a0f73f0ab9d1aab15889920f5d76fce8477b7cbb036a90a8636002ea4e35eabcc7349f0526063e539e204b7239a91c990d46da928505b17652d670cd7e734806f1524bfa7bfe07221cfec3b94dc023a03", 0x1000}], 0x6, 0x2, 0x6, 0x9) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:29:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:29:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) [ 752.125937] loop2: detected capacity change from 0 to 4 [ 752.157676] EXT4-fs (loop2): unsupported inode size: 0 [ 752.158784] EXT4-fs (loop2): blocksize: 2048 13:29:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:29:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:29:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5450, &(0x7f0000000000)={0x1000}) 13:29:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:29:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:29:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5451, &(0x7f0000000000)={0x1000}) 13:29:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:29:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, 0x0) 13:29:36 executing program 7: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)={0x1000}) 13:29:36 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x2, 0x9, 0xc8, 0x81, 0x0, 0x10001, 0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x99c, 0x185}, 0x400, 0xba4, 0x0, 0x9, 0x20000000000000, 0xfff, 0x0, 0x0, 0x1, 0x0, 0x10001}, 0x0, 0x3, r4, 0x0) open_by_handle_at(r3, &(0x7f0000000040)=@OVL_FILEID_V0={0xe7, 0xfb, {0x0, 0xfb, 0xe7, 0x2, 0x1f, "ed41d5a27462ef4800eeef0071636634", "028db46f39f2f8bce1b77db1d07caf514ff8d4670459028a0fe3d04a418f03e0e63ce80eb28122bb794b40b45a0c3154e30543df0e805061656927fb401ccb45bae40752394c4f5d45a9c2e22a4f5e2608868b34301bcd7dc24b0ede5069e728823e2df28cab6978d819088e0374bac94ef70be678313d20237c3a7386460451653e4c74b87dd2537c21871851639c4e1b9cec51fdaf1ebf91beca5168b6463a60b33c08ca12bdee6e3ae435b18bc368966c36e6c261edbc85c3adafee8938ef7b2b741c1f52f70f93e870a5a98e7c4dc15f"}}, 0xc4481) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:29:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, 0x0, 0x0) shutdown(r0, 0x1) 13:29:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) (fail_nth: 1) [ 769.770585] FAULT_INJECTION: forcing a failure. [ 769.770585] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 769.772329] CPU: 0 UID: 0 PID: 6894 Comm: syz-executor.3 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 769.772359] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 769.772371] Call Trace: [ 769.772380] [ 769.772390] dump_stack_lvl+0xfa/0x120 [ 769.772435] should_fail_ex+0x4d7/0x5e0 [ 769.772473] _copy_from_user+0x30/0xd0 [ 769.772512] vt_ioctl+0x191f/0x2e60 [ 769.772560] ? __pfx_vt_ioctl+0x10/0x10 [ 769.772589] ? perf_trace_run_bpf_submit+0xef/0x180 [ 769.772645] ? perf_trace_lock+0x337/0x5d0 [ 769.772701] ? perf_trace_run_bpf_submit+0xef/0x180 [ 769.772736] ? perf_trace_run_bpf_submit+0xef/0x180 [ 769.772765] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 769.772807] ? __pfx_vt_ioctl+0x10/0x10 [ 769.772846] tty_ioctl+0x78b/0x1810 [ 769.772896] ? __pfx_tty_ioctl+0x10/0x10 [ 769.772924] ? ioctl_has_perm.constprop.0.isra.0+0x331/0x4e0 [ 769.772960] ? __mutex_unlock_slowpath+0x151/0x750 [ 769.772999] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 769.773041] ? down_read_nested+0x2a2/0x470 [ 769.773072] ? __fget_files+0x34/0x3b0 [ 769.773102] ? find_held_lock+0x2b/0x80 [ 769.773138] ? __fget_files+0x203/0x3b0 [ 769.773166] ? lock_release+0xc8/0x290 [ 769.773220] ? selinux_file_ioctl+0xb9/0x280 [ 769.773263] ? __pfx_tty_ioctl+0x10/0x10 [ 769.773301] __x64_sys_ioctl+0x18f/0x210 [ 769.773336] do_syscall_64+0xbf/0x390 [ 769.773378] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 769.773401] RIP: 0033:0x7f2fb0d93b19 [ 769.773419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 769.773439] RSP: 002b:00007f2fae309188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 769.773460] RAX: ffffffffffffffda RBX: 00007f2fb0ea6f60 RCX: 00007f2fb0d93b19 [ 769.773475] RDX: 0000000020000000 RSI: 0000000000004b52 RDI: 0000000000000003 [ 769.773488] RBP: 00007f2fae3091d0 R08: 0000000000000000 R09: 0000000000000000 [ 769.773501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 769.773513] R13: 00007ffe9fcb8d3f R14: 00007f2fae309300 R15: 0000000000022000 [ 769.773576] [ 769.798089] loop2: detected capacity change from 0 to 4 [ 769.836593] EXT4-fs (loop2): unsupported inode size: 0 [ 769.837614] EXT4-fs (loop2): blocksize: 2048 13:29:36 executing program 5: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x5414, &(0x7f0000000000)={0x1000}) 13:29:36 executing program 7: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)={0x1000}) 13:29:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5452, &(0x7f0000000000)={0x1000}) 13:29:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, 0x0) 13:29:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, 0x0, 0x0) shutdown(r0, 0x1) 13:29:36 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) r3 = syz_open_dev$mouse(&(0x7f0000000040), 0x100, 0x402) r4 = accept$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, &(0x7f00000000c0)=0x1c) dup3(r3, r4, 0x80000) 13:29:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000", 0x57, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 770.114411] loop2: detected capacity change from 0 to 4 [ 770.129017] EXT4-fs (loop2): unsupported inode size: 0 [ 770.129936] EXT4-fs (loop2): blocksize: 2048 13:29:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:29:48 executing program 7: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)={0x1000}) 13:29:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) (fail_nth: 2) 13:29:48 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_config_ext={0x0, 0x1}, 0x820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() ptrace$setopts(0x4206, r1, 0x4fa77b42, 0x21) r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:29:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:29:48 executing program 5: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x5414, &(0x7f0000000000)={0x1000}) 13:29:48 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x545d, &(0x7f0000000000)={0x1000}) 13:29:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, 0x0, 0x0) shutdown(r0, 0x1) [ 781.628215] loop2: detected capacity change from 0 to 4 [ 781.648650] EXT4-fs (loop2): unsupported inode size: 0 [ 781.649558] EXT4-fs (loop2): blocksize: 2048 [ 781.700110] FAULT_INJECTION: forcing a failure. [ 781.700110] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 781.702686] CPU: 0 UID: 0 PID: 6944 Comm: syz-executor.3 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 781.702720] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 781.702734] Call Trace: [ 781.702744] [ 781.702755] dump_stack_lvl+0xfa/0x120 [ 781.702804] should_fail_ex+0x4d7/0x5e0 [ 781.702847] _copy_to_user+0x32/0xd0 [ 781.702886] vt_ioctl+0x642/0x2e60 [ 781.702939] ? __pfx_vt_ioctl+0x10/0x10 [ 781.702972] ? perf_trace_run_bpf_submit+0xef/0x180 [ 781.703034] ? perf_trace_lock+0x337/0x5d0 [ 781.703097] ? perf_trace_run_bpf_submit+0xef/0x180 [ 781.703136] ? perf_trace_run_bpf_submit+0xef/0x180 [ 781.703170] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 781.703216] ? __pfx_vt_ioctl+0x10/0x10 [ 781.703260] tty_ioctl+0x78b/0x1810 [ 781.703304] ? __pfx_tty_ioctl+0x10/0x10 [ 781.703336] ? ioctl_has_perm.constprop.0.isra.0+0x331/0x4e0 [ 781.703375] ? __mutex_unlock_slowpath+0x151/0x750 [ 781.703418] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 781.703465] ? down_read_nested+0x2a2/0x470 [ 781.703508] ? __fget_files+0x34/0x3b0 [ 781.703541] ? find_held_lock+0x2b/0x80 [ 781.703581] ? __fget_files+0x203/0x3b0 [ 781.703613] ? lock_release+0xc8/0x290 [ 781.703673] ? selinux_file_ioctl+0xb9/0x280 [ 781.703723] ? __pfx_tty_ioctl+0x10/0x10 [ 781.703765] __x64_sys_ioctl+0x18f/0x210 [ 781.703805] do_syscall_64+0xbf/0x390 [ 781.703852] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 781.703877] RIP: 0033:0x7f2fb0d93b19 [ 781.703897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 781.703920] RSP: 002b:00007f2fae309188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 781.703944] RAX: ffffffffffffffda RBX: 00007f2fb0ea6f60 RCX: 00007f2fb0d93b19 [ 781.703960] RDX: 0000000020000000 RSI: 0000000000004b52 RDI: 0000000000000003 [ 781.703974] RBP: 00007f2fae3091d0 R08: 0000000000000000 R09: 0000000000000000 [ 781.703989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 781.704003] R13: 00007ffe9fcb8d3f R14: 00007f2fae309300 R15: 0000000000022000 [ 781.704075] 13:29:48 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5460, &(0x7f0000000000)={0x1000}) 13:29:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:29:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:29:48 executing program 5: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x5414, &(0x7f0000000000)={0x1000}) 13:29:48 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0xa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:29:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) (fail_nth: 1) [ 781.919428] loop2: detected capacity change from 0 to 4 13:29:48 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, 0x0) [ 781.935184] EXT4-fs (loop2): unsupported inode size: 0 [ 781.935999] EXT4-fs (loop2): blocksize: 2048 13:29:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) (fail_nth: 3) [ 782.006225] FAULT_INJECTION: forcing a failure. [ 782.006225] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 782.008379] CPU: 0 UID: 0 PID: 6963 Comm: syz-executor.1 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 782.008414] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 782.008428] Call Trace: [ 782.008439] [ 782.008451] dump_stack_lvl+0xfa/0x120 [ 782.008509] should_fail_ex+0x4d7/0x5e0 [ 782.008554] _copy_to_user+0x32/0xd0 [ 782.008594] simple_read_from_buffer+0xe0/0x180 [ 782.008638] proc_fail_nth_read+0x18a/0x240 [ 782.008685] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 782.008731] ? security_file_permission+0x22/0x90 [ 782.008770] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 782.008813] vfs_read+0x1eb/0xc70 [ 782.008871] ? __pfx_vfs_read+0x10/0x10 [ 782.008920] ? lock_release+0xc8/0x290 [ 782.008970] ? __fget_files+0x20d/0x3b0 [ 782.009054] ksys_read+0x121/0x240 [ 782.009090] ? __pfx_ksys_read+0x10/0x10 [ 782.009162] do_syscall_64+0xbf/0x390 [ 782.009211] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 782.009237] RIP: 0033:0x7f244c74569c [ 782.009258] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 782.009281] RSP: 002b:00007f2449d08170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 782.009305] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f244c74569c [ 782.009322] RDX: 000000000000000f RSI: 00007f2449d081e0 RDI: 0000000000000005 [ 782.009337] RBP: 00007f2449d081d0 R08: 0000000000000000 R09: 0000000000000000 [ 782.009351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 782.009366] R13: 00007fffc2b6babf R14: 00007f2449d08300 R15: 0000000000022000 [ 782.009441] 13:29:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 782.108193] FAULT_INJECTION: forcing a failure. [ 782.108193] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 782.110024] CPU: 0 UID: 0 PID: 6967 Comm: syz-executor.3 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 782.110053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 782.110066] Call Trace: [ 782.110076] [ 782.110086] dump_stack_lvl+0xfa/0x120 [ 782.110133] should_fail_ex+0x4d7/0x5e0 [ 782.110173] _copy_to_user+0x32/0xd0 [ 782.110209] simple_read_from_buffer+0xe0/0x180 [ 782.110248] proc_fail_nth_read+0x18a/0x240 [ 782.110289] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 782.110329] ? security_file_permission+0x22/0x90 [ 782.110364] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 782.110401] vfs_read+0x1eb/0xc70 [ 782.110452] ? __pfx_vfs_read+0x10/0x10 [ 782.110496] ? lock_release+0xc8/0x290 [ 782.110542] ? __fget_files+0x20d/0x3b0 [ 782.110605] ksys_read+0x121/0x240 [ 782.110637] ? __pfx_ksys_read+0x10/0x10 [ 782.110698] do_syscall_64+0xbf/0x390 [ 782.110743] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 782.110766] RIP: 0033:0x7f2fb0d4669c [ 782.110784] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 782.110805] RSP: 002b:00007f2fae309170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 782.110826] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2fb0d4669c [ 782.110840] RDX: 000000000000000f RSI: 00007f2fae3091e0 RDI: 0000000000000005 [ 782.110853] RBP: 00007f2fae3091d0 R08: 0000000000000000 R09: 0000000000000000 [ 782.110866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 782.110879] R13: 00007ffe9fcb8d3f R14: 00007f2fae309300 R15: 0000000000022000 [ 782.110943] [ 782.193637] loop2: detected capacity change from 0 to 4 [ 782.205148] EXT4-fs (loop2): unsupported inode size: 0 [ 782.206223] EXT4-fs (loop2): blocksize: 2048 13:30:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x40049409, &(0x7f0000000000)={0x1000}) 13:30:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:30:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:30:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:30:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:30:00 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) r1 = getpid() pidfd_open(r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)={0x80000000}) 13:30:00 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, 0x0) 13:30:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:30:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) shutdown(r0, 0x1) 13:30:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x40086602, &(0x7f0000000000)={0x1000}) 13:30:00 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, 0x0) [ 793.225719] loop2: detected capacity change from 0 to 4 [ 793.244332] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:30:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:30:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) 13:30:00 executing program 6: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x79, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x3ff, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = epoll_create1(0x0) r1 = getpid() epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) r4 = signalfd(r3, &(0x7f0000000080)={[0x3]}, 0x8) r5 = getpid() r6 = openat$random(0xffffffffffffff9c, &(0x7f0000000480), 0x18a00, 0x0) ioctl$RNDADDTOENTCNT(r6, 0x40045201, &(0x7f00000003c0)) pidfd_getfd(r4, r6, 0x0) getpgrp(r5) pidfd_open(r1, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r7, &(0x7f0000000040)=""/102, 0x66) epoll_pwait(r7, &(0x7f0000000200), 0x0, 0x20000200, &(0x7f00000001c0)={[0x80]}, 0x8) pidfd_open(r5, 0x0) ptrace$setregset(0x4205, r5, 0x2, &(0x7f0000000280)={&(0x7f00000004c0)="cb3a5b583298591139b57e82eddce454b8cd5ac61109d33fb46ee506533e33cd2778b790bc98febf5e3c8c3ba1b311c5fa1d1ccde224382296f3f24c1d251297a0d1fc10419e1224de1236fa8a0643b11f1e781be7946f8dbddbd0ca8ae3c741917d8ab42306f28d45237740ff7fe5eb5f9cb8c94cca8b86062bbf3abe2a7c2400010000000000000e662f5f22aa2f68e4bc32960c2bb4c70cf08dccbafdeadac6b344478f01e5fa36a4feabcb4f1c31d39e64b0592d5945d18d5d6a7863b8bb8f6c7156b8521fb859a71c82223fe26f45ac4e3d6c5a45b3c2a292dd2c2c3db15ab2147a41617c6350789063f2f91b851038d21506004ea654cb7839cef700"/268, 0x10c}) syz_io_uring_setup(0x6aa1, &(0x7f0000000400)={0x0, 0x67d7, 0x4, 0x3, 0x280}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) 13:30:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x40087602, &(0x7f0000000000)={0x1000}) 13:30:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x2, &(0x7f0000000000)={0x1000}) 13:30:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) [ 793.413594] loop2: detected capacity change from 0 to 4 [ 793.418545] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:30:13 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xf}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/acpi_cpufreq', 0x448a40, 0x4) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x100000001) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:30:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x2, &(0x7f0000000000)) 13:30:13 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)) 13:30:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:30:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b2f, &(0x7f0000000000)={0x1000}) 13:30:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:30:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x401c5820, &(0x7f0000000000)={0x1000}) 13:30:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) [ 806.726910] loop2: detected capacity change from 0 to 4 [ 806.764051] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:30:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b2f, &(0x7f0000000000)) 13:30:13 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)) 13:30:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b30, &(0x7f0000000000)={0x1000}) 13:30:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4020940d, &(0x7f0000000000)={0x1000}) 13:30:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(0xffffffffffffffff, 0x1) 13:30:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:30:25 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x7ff}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd7, 0x2, 0x40, 0x3, 0x0, 0x2, 0x8900, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0x4, 0x80}, 0x1, 0x537, 0x3ff, 0x1, 0x4d, 0xff, 0xf157, 0x0, 0x20, 0x0, 0x80}, 0x0, 0xf, r1, 0x8) r2 = getpid() r3 = pidfd_open(r2, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x12000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) 13:30:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:30:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, 0x0) 13:30:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b30, &(0x7f0000000000)) 13:30:25 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)) [ 818.981913] loop2: detected capacity change from 0 to 4 13:30:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80045432, &(0x7f0000000000)={0x1000}) 13:30:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)) 13:30:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:30:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, 0x0) 13:30:26 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = clone3(&(0x7f00000003c0)={0x10040000, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0x14}, &(0x7f00000001c0)=""/183, 0xb7, &(0x7f0000000280)=""/80, &(0x7f0000000440)=[r2, r2, r2], 0x3}, 0x58) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0xff, 0x1f, 0x0, 0x7041, 0x0, 0xe, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xaf, 0x5, @perf_bp={&(0x7f0000000040), 0x1}, 0x328, 0x7f, 0x7, 0x3, 0x10001, 0x9, 0x672, 0x0, 0x7e00000, 0x0, 0x1}, r3, 0xc, r0, 0x0) r4 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000000000)) 13:30:26 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) (fail_nth: 1) 13:30:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b32, &(0x7f0000000000)={0x1000}) [ 819.254255] loop2: detected capacity change from 0 to 4 [ 819.257304] FAULT_INJECTION: forcing a failure. [ 819.257304] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 819.259185] CPU: 1 UID: 0 PID: 7089 Comm: syz-executor.7 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 819.259215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 819.259228] Call Trace: [ 819.259236] [ 819.259244] dump_stack_lvl+0xfa/0x120 [ 819.259285] should_fail_ex+0x4d7/0x5e0 [ 819.259314] _copy_to_user+0x32/0xd0 [ 819.259341] simple_read_from_buffer+0xe0/0x180 [ 819.259370] proc_fail_nth_read+0x18a/0x240 [ 819.259404] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 819.259436] ? security_file_permission+0x22/0x90 [ 819.259466] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 819.259507] vfs_read+0x1eb/0xc70 [ 819.259545] ? __pfx_vfs_read+0x10/0x10 [ 819.259575] ? lock_release+0xc8/0x290 [ 819.259608] ? __fget_files+0x20d/0x3b0 [ 819.259649] ksys_read+0x121/0x240 [ 819.259677] ? __pfx_ksys_read+0x10/0x10 [ 819.259718] do_syscall_64+0xbf/0x390 [ 819.259754] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 819.259777] RIP: 0033:0x7fade354369c [ 819.259794] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 819.259815] RSP: 002b:00007fade0b06170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 819.259836] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fade354369c [ 819.259850] RDX: 000000000000000f RSI: 00007fade0b061e0 RDI: 0000000000000005 [ 819.259863] RBP: 00007fade0b061d0 R08: 0000000000000000 R09: 0000000000000000 [ 819.259876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 819.259889] R13: 00007fff59878bff R14: 00007fade0b06300 R15: 0000000000022000 [ 819.259925] 13:30:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:30:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(0xffffffffffffffff, 0x1) 13:30:36 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/timers\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) 13:30:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b33, &(0x7f0000000000)={0x1000}) 13:30:36 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:30:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, 0x0) 13:30:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:30:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b32, &(0x7f0000000000)) 13:30:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80045440, &(0x7f0000000000)={0x1000}) [ 829.956160] loop2: detected capacity change from 0 to 4 13:30:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:30:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b34, &(0x7f0000000000)={0x1000}) 13:30:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:30:37 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b33, &(0x7f0000000000)) 13:30:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80086601, &(0x7f0000000000)={0x1000}) 13:30:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 1) 13:30:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b35, &(0x7f0000000000)={0x1000}) [ 830.255137] FAULT_INJECTION: forcing a failure. [ 830.255137] name failslab, interval 1, probability 0, space 0, times 0 [ 830.256932] CPU: 1 UID: 0 PID: 7144 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 830.256964] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 830.256977] Call Trace: [ 830.256985] [ 830.256994] dump_stack_lvl+0xfa/0x120 [ 830.257036] should_fail_ex+0x4d7/0x5e0 [ 830.257066] should_failslab+0xc2/0x120 [ 830.257101] __kmalloc_cache_noprof+0x73/0x6a0 [ 830.257129] ? task_active_pid_ns+0xa9/0xd0 [ 830.257150] ? alloc_name+0x41/0x110 [ 830.257183] ? alloc_name+0x41/0x110 [ 830.257208] alloc_name+0x41/0x110 [ 830.257235] __x64_sys_memfd_create+0x130/0x280 [ 830.257264] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 830.257306] do_syscall_64+0xbf/0x390 [ 830.257344] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 830.257368] RIP: 0033:0x7efc34339b19 [ 830.257387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 830.257408] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 830.257431] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34339b19 [ 830.257447] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007efc343930fb [ 830.257461] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 830.257475] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 830.257496] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012e00 [ 830.257533] 13:30:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b34, &(0x7f0000000000)) 13:30:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 2) 13:30:48 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80087601, &(0x7f0000000000)={0x1000}) 13:30:48 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x2, &(0x7f0000000000)={0x1000}) 13:30:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:30:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:30:48 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = getpid() read(0xffffffffffffffff, &(0x7f0000000040)=""/102, 0x66) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/102, 0x66) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [], {}, [{0x8, 0x0, r9}]}, 0x2c, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfc, 0x4}, 0xc, &(0x7f00000000c0)=[{&(0x7f00000003c0)={0x17c4, 0x38, 0x400, 0x70bd2d, 0x25dfdbfd, "", [@generic="3358b51b8f08574752183dcc28a4b904a177d58e738df12754659e43c485880219743b290a4b40261d4e307a5a8b531f49503b5bd64fc9c03e36eb1ad25354fef86978a17eeb108eeb38f4ea912c0996a32eb8dce1b3ea771cf139da8ec66fc5a6f775fcee52a1b13aebda8ea0ce57c7ae3a58044533fabf3c5714032e94832c2aea5f2cd315ca894bb7824952fcc957ef739aac62581facdbc789b020f78ddcf84c2be5e2576438e4305cbe33c4e3dd64566a68cd56a9acbaca2be2cb9a8dd9fd3c83a01e46137b8d8a0ddea7fc02b5a96acdf084dc200edbaf9a3f0413508ebc6981d64acf8f0a702f36e3c659", @nested={0x20d, 0x13, 0x0, 0x1, [@typed={0x76, 0x45, 0x0, 0x0, @binary="9550bab9fc51abdbbaf3a1b3ae6d3cbe253e6e4b38f76a12ad943ca8f6002525a705f130d9256a850ca2903670d8f581721ae76d11ea117f2367a5635cea82c3ae9eef2b8192729a82c5bae571f64cd24102c1c0b32a23d377cc78e9cf30f8bd832d193837c42f0edba0b338ee2249a3b832"}, @generic="f6562b8fb5b695c7468a7494614dfa20dd596bf64c78ce68f4412bb40ece8af1a6bb211ff1a73c65f78aab1368a97745aa29c329af8f9c4902ab562bb065178a2829d29c44af474846319c5fffeaa384ad2df3d3cf19c5008962bd7c1521f6dc77eab48d226dd04d3c222536abdaee2551f6b7f72cfca28264bbe848c544dfa55be2dfb4339a77736778ab00045e8a762895c95ff83367bca605c1c8e0ac72aa4938021dc388825605da783177916461c26706aa17", @generic="e90f99600e7b1802851473277e9622c61270c3c9c83bf085bda3d5109f30c294b8cb70666ebbc37fc7490297d3a44f01edd00b19080642609fa07031ee70a8cd4cf6ba0b608b29cd52a0253c3a079784cdc27d029b54b8612f51e17faefe06d0231dd93e55a083e63aafadc0f544e24709732d3c43f9067fdb38e72bb595d6f541d83e958a849ab02038ef33ee55861145f0fef8dcea51f219c8f72963f2e99f4d8c64961f3b42b788dbc17600f904242d5d77880561d97825cae77de511e16af99e7b44e286a278d672ed44d32448ce6747134c81aa753b648fa7c2"]}, @generic="cf55acbf29b659f42f5738f56feb5cc54cd4446e378088f03404d36cf34f4689b698405341ffa1c67a5638d3f237b233de296b7faa4fe54b6ec6138aa22030a6d6ae9adbe856b2e318683a75a358e573856db81a977e7269fcb1050f6374405b1c44107218f0f4dc49673114964fd33d279331ca103670e3d7961430890a9fb5308eedadd4dbc8d5b43d6931c2b56f12485bd0c83a06abf5951eb741172449cb33e06667cc7e4b5421b65cad5359235b11755ab9927651d470dd5637f93f44066536620d9f48484558ade0f8ba3029c121c5e3195b1f11f3d20eefce62f866591286579052803347e9d8252277d9f5a5b2e3ee59cc4ca19a9b9cd4706d4a79be72c3b299349d64362beb72d9e137127894ce405043d6e34cc8fe70fef6f94d1a4161f63a4bae6b3d7d5672a3ba2f716cbf61732f7992f558bda652db5557f39a7ca46d4b240532c500a1618bfe0998dca7da0d255210ec7b43109ca2324a5da63c65192bc5e0b67586bf398765684eb88d94d574d3db57fb8760f0e7f07f5f6d9e350f4acd964ae40a562c37f79b7a637ef8cadd33917f9ee5536e2cc57a80e079b7169347024fae8c68c2064304f455e43be6a9c76b1fbc851027047b9f50de6771008487e4177610abe5edbcc602c108008b1a6fcf992ac407ace6c9dd4d03ff7765660096cfbeb4c752d2166b6b9396557f5e0f2db81b729f6efb17b9b2333a3c68880aed8490cd89f15a81b23a78b64fad038c4e665c608ede5c782ec4770eb30a8208ccb2a5c3c8f875232357c5a247c3d0b3717852ba6368540db3ceedb0a2e815a75005e29d91cb9ba9bd9e06e7fd4ee2868895d9889239526cda3f6732539a36dbac051bd27b060c8d8e0fa97a80d450ab4ed0eb79592c2dd6acf10451cde7177374a1d151bf34e31ea3b33e960ab4b999b3e1b8ab1ee1ce572741511218d4b234e67597071fc91284aaee054d31d1ad11ba6b4b5f9178257a84601099f5adff9abc486824b624bd544fdd7771993c11baf8c7ee0d25db6ef85b7b3250f6ae5ff638a44d672d386e9b39f0965fcf3fa06dab8b64dd6b0969f660379f73fdbc4bdd5b82dad2ce4cc1543a14c3a995f6fbff5bc1f56e23c1ea9ac5b9a0ae195c4d4bd493be0a4087988ca2efe53cf2cd66a119bf85b3b3975a6e897d694bfad81550e7b8612bdf85e02d025980d09ffcb46148eaa07e710139e5237b10c99997837febbfc0c5fa6b1a897f52d33672a3de0dbef8cd1a4379fc05dba8510b71bb20fe178b4e42ecfde65c4818b166c4fc61aa68cd5f78a49a8a3a113e2fe20455d9bfcc78e25a0ca9dfd8f004e92c1f3d27c22062b8a8a3c2fb5ce1512a6b675d978ec82ff20b9919de8dc93ceda56f6980daf1b7cfc8159d143db3bd7cac81e309a705dcd245395dd20973bffa2b1ad3e2f176d68aa1d659fee91c19694d766387a2bc5a17cd9f714d6eebb51cda59a784b7fc1807eaf9d3c860a4187c35a9197ee016d2d2a053117db19c87c2a13933cb1ce5fe58c6b6265175d9a6ef5da259cdfc71d8734c0585adc6d91c13bfca58e84308022a0199db9c99df3693bc392706a1e6d9b72a70cc83ec209b325f779d23d2e5481f4fa356e4494ef6618740f4acaac063bc9613b99c205ca04b99ce416e91776945b1aa400a9a2a35c9544edaa3b1af4b6bf1433f4347d817252d31e6dc6254a60075945e16ba1758363cc65518d3c73c3534aeb0508a6b8bccab40b709e55eb3a94c37c6ef8a7fce8ebb8c86ddf57cc3098ffcf8bcb7f0f25386613a7dbc89be87f12608b4fa4bc4d112ffcc07c8660eddaa6be8dea9d722679b1f2374410e07baa945c5ecd1cffc4f118858414100643dbe0eb727183d1c8a1571bbd476a805dff87cc209d92dcfd8b84f992a03c1336685fe24c28a656f05bf9c43c67987d6b6df566f7c0efd798f107b163544c5e3d4f94e5b2fd7ada3df29b334266263db47dbeb5b6649a5c14a4bbcc4e9f865a4525fd73ce2863933335354a696c56945166f2d6d27269dc6eb4571e3925549d99425368a6e0df3ab066850023bec9b50cadcf27d2567c3e9e1bfc4b566c821156bfae0afe8950ceb8ea9e0a463d7cb955679aeabb52b33bd973d6660b62070acf596491e2337a3313452b8ed3046c2db3bae2a8632cdf61fd557db3af949346b18949a05e1a5ff34f1f050268f272a1fb6816c6745c0fa028ecef8b6b13d71001253c22453b50dbda1be7b093333f9d02d525c22f4dbd5b9c90bf87b62d9537a4a19554ecb7d9827faf38c328aa0da4bd53ddffd0ddfa4cfbd7b2224e582d49fa35551a3de67c31953e9b700cd315ccccdcecc16bbd4ef2ad8894231153d35357c9bec690d03d06862837f88e1cef6bd6a088628b1bc2d2891d6ac22a3089edd921cf5db330142b185b69e59269b5874da2e00d2234d448767409057a421c5537a3aa976694602f549585ce8874c1040650f51c4f8368c6e72cf9e8c4e233b882b6a324bcb12cb7e56657fd4f12d89b65ea0d753b94d6d6d86832d5b9fe0912dcc7fee6ece0be51b4c073eb79c4eef35e0adf2b1c0f9fd3671b74669f9576460536531bcf2b04bc6adcf86019c10f11b4c4a1ab1afd3849c782e4558feaff6035f294a18dae4ce293f2a467638eb97db6c71220a4917416a3afac093faf1afb8f54026bea6e5020c6add9f9766f3898e48e91b3d74ad64122bdc41f942ce969a8adb85f42ff9f17a3f4a4416a8bd42152ef85df6433ad3a920b11da98ca2025d43692d48b3172c32e82e19739c2ade54bce88c71e9317ad1c101ccd39eec7e2d6e288930aad1f123b01a74b7ba07fd0d2e669610bf0f074c41051d45e0edf1629f3c4b344b316abfc1c7763452b86952f759d7597169d9b7c4c749122a3b061edb942b4561adf873d6d68668483a305b0abffc14d591f4c6da11bca57fbe635b30c15cdb47cce48cdf515baa41c5ecbad90210e7e7256ee204132f3c210dbde6b195693de95204b8ef301c759ec18b32b189b07de5d104a3801b6540bf6c57b06f077703af484b325b8b204fbb2510653a61a86b7ea1e790da639451d5d7f49ce20b0e6ef3826b05d1a6e5742c3b9ec3ece7fe7ad004b2ba8638c6a7f0fb388d2f83472973dc62cd9cace4a74a67edd79b23663b2858e7eaae0b52fff570c982aa0e8c6ad9ad4bceba79019a05fab84cfb3a3e450499fcc9adf34c8af5ef3d79a81bd0a3138f7769d0c08efe14d7aa5c6b2565fdf0785afb966eea193df195fb6eec340b5ab31a5e6e622170ad83afe04ddb674f93a53560b3672e2a8a0e8eaa96b435655ad7873d1e37f944f190fec96b81865411d33b575c7ddeaace7c4d18240b4ddbfab3a4c44884e8216aabc31b8788e9228b56c08b3b1c8cbb5530ef58b2a0f77e89cbec50aabfd3028eafa2385d62b837fdad7ebdeaa1f51aa71f8564ca6b1e9a1cca68956060653062c6f340e6fcbcbd42781ee33316fee324233ffded37ffd95e9e2df2e4ccaefe9288d6a4fe518d9141b5469dc75c40de98f91fe318c1e10d202a6452c74ea3b8f37fff126cc64b00183dc076aafc7244689b944327812f6e3ef5143b14f20af44738056b72061113dee639971bed6a1aa01634eec5996e18151dab4329afe286441b4652e4fb5e1e3dd485dc603b36bf5c2cb01d08d70b112184c9e57b281ee832871bbd112cc4f4746224c8433b7cd931e3f39e05b7b5d2867c93fc1ed2b2316237cf4571fc64be45d36a688c9196135c70ca9eb0b2ce4bd083ca9661c184d4f6868bfa17aeb4cd107e91c762676453c0f20ad2faba3dff03e13a5e0f464c36df94da5f66db5306bf8aad6ca9909d873d1fada5d6503aa61047300d144f8c9da5af55f0879eb4e5aa6342ae0e490d6e6bea3845ab75553dd98de8a128e8acfc04a95f5944c02d60ae08bb3fb55b9f7890e71be11d7a353f838342921d8f719f7f075f812b26fc0072f1b09b74da99faef7fc534efba3085ef41b4d544ff95b4818eedd0112cd49771fc075a4e7baed7f70e9ef160706637cc88a23f5662d53bba1578ac58471c10ab1d4e76d9c7b214d86f01c4d8e1d0d784ebccf588d13a90b0dc3f5fc46ab5a64ae078296b09ecef22f8333d32a608be726032d9cbad0144960c51177a170261f005e47efe8fec0ee3843021ae4d140fa497bbafff5bab56e3bebb7654800e4fd23e3996dcedf01ab32dacff6ab3b74eb9634ff6f192b10733003a342ec072c5fdd0d26c29a00be2cd950708907f1d3eb097b3ec6ee14b9b1d0d2296a763ac52eb584ad2431e02541c8a0d2ac5635b4a2b169e1b9f1b8c013f832802deda3877b7a16776a81c7395c2be044db82a005b9fa0e4946722d92c83c624c4867d4b713a36de7c3285de2eada1710592f339f5c1d54ecea8f234a257f6200ab7ac707f758cff4c3cc8a63ed74f59a02e88b55b06c0596368e3bcfa4cdddb73caeaf5afbebe83e8e2f2ecdaa6e5ca04f83383cac3f624a1d84d90300b694b173990c44592f73c9214016d5d71472a5aee862923e6baeb5fa71d781e96fe41424e72428971c960ffeb7b35dc39d75dc02d095395cb663b58698e1f535182721dfcce72fc2124ccdb8788a60e78fd9feae7fc0b4249c767332eae750168598f1fb6454c2dbc425f1653d2350c8e28e01c50e562b03425b659189054e2e8f7e9730519691ad4d98347ab3da2ca21ec28ff52188048bee8af7bc634b9184418af8ceb6c10aabee14ff2de74914416bc0bcf39dbba24fe22d80764df82e2d70dfab6c6bf54e8fd7d14042a486ac48972d83e85ececf402b81e1cdcad68264537d084c72a88284db65bcd3e02deac7a1111cb2efb70e5f07294c8e878a76e6994b6db31cccaf4c7ca50721d8725873ea95aac879fc890ce353793f4ea3c2873e9f382a10b97d4413430c4275a31508e97c31a231f4ac7753ebee9d1250ce6b87936212be2b09e76438fa761567d414b85c0a4c4048de45c54fd978989cc3d1bc9141a02e95efc482d4665c31abc5885997b3d6dca54f1c578f25e72fe2919cb4a9e349d5f3435ef6dbc934709aa070f94f75326bc67227e24cf74da5d44d5ca5c2056c0c5de7e189055d91cd11787ad4c20400b08aac14272cdbdd42a10ae523952b333e62ea57d48f51c2566339f6de537c01a21097ffe9c99b420b64aaa47b275b618bd63a4956a2ec7384f432ae54a8489afc78628c9314bc3f0172e61729ed59848796caa1bcfefc64ec6a6550fdb9a48cf6ac18cc91699f86452297c7e5fb41158f81e3d1dcd81745c9a281477cc8a210b57669d949a9899a8e3547d2d6a0b8e0518ce0985f827a1dcbd00b3cc837d2e54aead73949ae568f5f18689aa979cf93588491fdc99e71198f7e73e84452303a02b0d44b6338ded823c395357c7dbc9b0af54c6ba2577dddaa8db63f0280bcb3df0f5009b2bc52521665cfc8a81b2f32299b889464bff57fc806cbcd36a460853cc08284580c4838791d27fe03d6cd68658366703a288219009369fd63256a398969663cb34a20eac7a481c9756583cd9833cde5881e445f1c2806b9670b1c7cf9905228d45e6f5fcf268884294d66ff6bf71440918242a38815c451d7e6e0f73039d6acdf4d753a6d0a97e620a9260082353bf09de1ac340cf16b3ef569d39fe45ec21f53bea5d21c4c16e4b4850514c9380b454ef67d69b878fce8e3f35398976febf7b19c10f19832b6a47825faffb1fa2743ee40c03f01b78c53205432398fd191755132cdbfbd51f5a2777c7c50e37004e79e7f7b547", @generic="eb1ae2ffe8fa76c905780f4803e68e94dc264936aeed8e6b432bd2267b9fa8a8814a2676f8af7d15dd44e289e0c9bd8785e78449f2b1c850568ce6889e44ea57185b7bd9a1da49fbdff500fa20b92301e97466f303cdcc86d087c7e917578158b08ea97ff840a6bb0228f6bea236984bc7b7c7718dae171eb2e21e02c6137a16d463d5e277a181b4b6d7d6f955482fae7e7031a2f5a2a91bb3c310fdbada70166399caac8211a3515ba2923a7a8b795e66650db5f761ea828b240322ad65eea6b9cfd1ff18d2bc4a", @nested={0x118, 0x71, 0x0, 0x1, [@typed={0x8, 0x15, 0x0, 0x0, @str=';@\xbc\x00'}, @typed={0x3f, 0x90, 0x0, 0x0, @binary="36e5d787887624ea9726b299d21d75d594e91180a0999b31ba32f6a8e718b703fcc22c19eb0604995b175a559ee45b6123052994c818022853401d"}, @typed={0x5, 0x26, 0x0, 0x0, @str='\x00'}, @generic="fff57f83e37969c4d797421ff4252b88f5a1032156d3dba3fb1c132af440a3e4f8cd68b195ade85074530cd96382cb18b1caec06027ff33f0ff26bb60ebf1a3d95d65d9f7765a59498935b5340395b3aae0885563ff866028ce706e0d414ca388c05744f55d1bd7703f6076dbbd6a42fbff0fbd3", @typed={0x31, 0x19, 0x0, 0x0, @binary="dd4ffd8377c77219ff1515ed313a903fc7bf8a16c5620acaebd8490f0680dc744b805060ee0e66be86e07f3e3b"}, @typed={0x8, 0xf, 0x0, 0x0, @pid=r2}, @typed={0x14, 0x62, 0x0, 0x0, @ipv6=@remote}]}, @nested={0x83, 0x33, 0x0, 0x1, [@generic="15833b336f326ee1de760950be87d0a008122d84e390c75b588341dc581959246ddba051509f222fb9946ef95d744e6e667b99c01d51a0825c01f30e26ffbfa67c309fd7c23190f83a742aef917363119384bc2988f81cd556ffda7a7b96c7a731e88b5fbcfd9678533b58b1cb06e62ce985ff03e97ff0acb7ce19db3684a9"]}, @nested={0x153, 0x77, 0x0, 0x1, [@generic="0513d6fb163fe914f95ba695163bcfe5d57af223c9fe8bba9647bec79689ba8c671b3659e574e0138f2cc1941073b768413fcd9c3803203408f78d77b27e6aee296c14b21e6378605096a1d41083c5e5f5bed758dde017a9bbca34ed5b771776cc89645575f2e20e3add4d05b2761cb822e70fca37a8d5e7102bd825d2e5e3277e2f05eaf59311f3476eb4c2a9a5230d69f35b79e584829f", @typed={0x8, 0x81, 0x0, 0x0, @u32=0x6}, @generic="49e153678b6e3209387fe71c325c4e0cd27904e90bc52afb81d2961ba6db5b8da7528f130f4af396693b284cd42bb04c5df29a5bd9bc4a", @generic="86630b27c43f63213e60ccb1c186691063eec4db81c110a0dcfaa2d1d788ca3e4e33dd153b39b8c5bbeaac0f656dc56ba8ff8f5d6805350a17e25480afc280f4a3bd3d9aad02fdcc87b1c75062c5bbadbf8b0979a6ea7f02ce6cae6571c6950c959e06ac1c0ed8628b7db7f7", @typed={0xc, 0x9, 0x0, 0x0, @u64=0x1}]}, @typed={0x8, 0x42, 0x0, 0x0, @pid}, @nested={0xf4, 0x6e, 0x0, 0x1, [@generic, @generic="8a6e10f188cbd439f8ba9100de3d3ee0d6c898a594ce422ffacc40f9be0fc342704c6491f95e09974251a07db12cdf3118bcd3e5db0ad54f5f82504559006780b8432914303f17961897d34c618f0ceda6039f93c09e307fb3bd621ea6717cad165a7575c810e8e591d9a88fe521650104706eb6cc11bf57e147c7be1b565a6ba933ace3e61c47a7214104a60d87ea5461d025ff512be1619f75d8c6b50f93f716f01c939c360adf8d1dca511672ba175d19414492623bb85d5961bdd1388e592c35f85a1d8a96a758bb713e6ed92331", @typed={0x6, 0x36, 0x0, 0x0, @str=']\x00'}, @typed={0x8, 0x4, 0x0, 0x0, @fd}, @typed={0x8, 0x44, 0x0, 0x0, @fd=r1}, @typed={0x8, 0x3b, 0x0, 0x0, @fd}]}]}, 0x17c4}, {&(0x7f0000001bc0)={0x10e4, 0x39, 0x200, 0x70bd2a, 0x25dfdbfd, "", [@typed={0x8, 0x2b, 0x0, 0x0, @pid}, @nested={0x10c0, 0x2e, 0x0, 0x1, [@typed={0x4, 0x7}, @generic="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", @typed={0x8, 0x46, 0x0, 0x0, @uid}, @generic="73fb356600d54330a719d85ac1049ac76a68a5bbd6ba0046d439ed79dd27e6d9e67c1b692891e529252bc1f5cc8314dfa15da78cd70a6194deff470b1994d3a866f4bb2bfab6fb18de40c32ba6b33d7d2bfbd915a18cbacec67c776e3e0782177713b81bb81fd85e225f5c9cd9d13f449abfa7a670b5b8baccf1e20a859c1f60a7551fe757fb446e8afeef204fbde76658f7a36e399e3bdeab85a94bd94868ed6a43ef64a1127c2e3b652fd73d5dc764"]}, @typed={0xc, 0x83, 0x0, 0x0, @u64=0xbd}]}, 0x10e4}, {&(0x7f0000002cc0)={0x1034, 0x3b, 0x200, 0x70bd29, 0x25dfdbfe, "", [@generic="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", @typed={0x9, 0x35, 0x0, 0x0, @str='\xf7%{^\x00'}, @nested={0x18, 0x9, 0x0, 0x1, [@typed={0x8, 0x67, 0x0, 0x0, @uid=0xffffffffffffffff}, @typed={0xc, 0x65, 0x0, 0x0, @u64=0x5}]}]}, 0x1034}], 0x3, &(0x7f0000000140)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r3, r1, r4, r0, r5, r0, r6]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, r9}}}], 0x50, 0x8801}, 0x450) epoll_wait(r1, &(0x7f0000000040)=[{}, {}], 0x2, 0x1) r10 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r10, &(0x7f0000000000)) 13:30:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(0xffffffffffffffff, 0x1) [ 841.227738] loop2: detected capacity change from 0 to 4 [ 841.248703] EXT4-fs (loop2): invalid inodes per group: 0 [ 841.248703] 13:30:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:30:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b35, &(0x7f0000000000)) 13:30:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b37, &(0x7f0000000000)={0x1000}) 13:30:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 3) 13:30:48 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b2f, &(0x7f0000000000)={0x1000}) 13:30:48 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80111500, &(0x7f0000000000)={0x1000}) [ 841.404234] FAULT_INJECTION: forcing a failure. [ 841.404234] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 841.405236] CPU: 0 UID: 0 PID: 7186 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 841.405252] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 841.405260] Call Trace: [ 841.405265] [ 841.405270] dump_stack_lvl+0xfa/0x120 [ 841.405295] should_fail_ex+0x4d7/0x5e0 [ 841.405312] strncpy_from_user+0x3b/0x2f0 [ 841.405333] alloc_name+0x78/0x110 [ 841.405355] __x64_sys_memfd_create+0x130/0x280 [ 841.405374] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 841.405399] do_syscall_64+0xbf/0x390 [ 841.405421] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 841.405434] RIP: 0033:0x7efc34339b19 [ 841.405443] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.405455] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 841.405468] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34339b19 [ 841.405484] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007efc343930fb [ 841.405491] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 841.405499] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 841.405506] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012e00 [ 841.405525] 13:30:48 executing program 6: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, @out_args}, './file0\x00'}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000080)={0x800200f}) 13:30:48 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x5414, &(0x7f0000000000)={0x1000}) 13:31:00 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b30, &(0x7f0000000000)={0x1000}) 13:31:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:31:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 4) 13:31:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)) 13:31:00 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) fcntl$setstatus(r0, 0x4, 0x40000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:31:00 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x5414, &(0x7f0000000000)={0x1000}) 13:31:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x801c581f, &(0x7f0000000000)={0x1000}) 13:31:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x0) [ 853.201972] FAULT_INJECTION: forcing a failure. [ 853.201972] name failslab, interval 1, probability 0, space 0, times 0 [ 853.204060] CPU: 1 UID: 0 PID: 7215 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 853.204095] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 853.204109] Call Trace: [ 853.204118] [ 853.204129] dump_stack_lvl+0xfa/0x120 [ 853.204175] should_fail_ex+0x4d7/0x5e0 [ 853.204207] ? shmem_alloc_inode+0x27/0x50 [ 853.204241] should_failslab+0xc2/0x120 [ 853.204279] kmem_cache_alloc_lru_noprof+0x76/0x680 [ 853.204326] ? shmem_alloc_inode+0x27/0x50 [ 853.204358] shmem_alloc_inode+0x27/0x50 [ 853.204390] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 853.204422] alloc_inode+0x67/0x250 [ 853.204464] new_inode+0x1e/0x160 [ 853.204516] __shmem_get_inode+0x17c/0xe80 [ 853.204565] __shmem_file_setup+0x107/0x370 [ 853.204612] alloc_file+0x11c/0x500 [ 853.204643] __x64_sys_memfd_create+0x193/0x280 [ 853.204676] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 853.204722] do_syscall_64+0xbf/0x390 [ 853.204765] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 853.204791] RIP: 0033:0x7efc34339b19 [ 853.204811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 853.204835] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 853.204860] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34339b19 [ 853.204877] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007efc343930fb [ 853.204892] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 853.204908] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 853.204923] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012e00 [ 853.204964] 13:31:00 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x5414, &(0x7f0000000000)={0x1000}) 13:31:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b37, &(0x7f0000000000)) 13:31:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80811501, &(0x7f0000000000)={0x1000}) 13:31:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, 0x0) 13:31:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 5) 13:31:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3b, &(0x7f0000000000)={0x1000}) 13:31:00 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)={0x1000}) 13:31:00 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) [ 853.370884] loop2: detected capacity change from 0 to 4 [ 853.384645] EXT4-fs (loop2): invalid inodes per group: 0 [ 853.384645] 13:31:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3b, &(0x7f0000000000)) 13:31:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc0045878, &(0x7f0000000000)={0x1000}) 13:31:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, 0x0) 13:31:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 6) 13:31:11 executing program 6: perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x7a, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:31:11 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc0045878, &(0x7f0000000000)={0x1000}) 13:31:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, 0x0) 13:31:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3c, &(0x7f0000000000)={0x1000}) 13:31:11 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x0) 13:31:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3c, &(0x7f0000000000)) 13:31:11 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b32, &(0x7f0000000000)={0x1000}) [ 864.949684] FAULT_INJECTION: forcing a failure. [ 864.949684] name failslab, interval 1, probability 0, space 0, times 0 [ 864.951697] CPU: 0 UID: 0 PID: 7271 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 864.951729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 864.951743] Call Trace: [ 864.951751] [ 864.951760] dump_stack_lvl+0xfa/0x120 [ 864.951805] should_fail_ex+0x4d7/0x5e0 [ 864.951835] ? security_inode_alloc+0x3e/0x130 [ 864.951858] should_failslab+0xc2/0x120 [ 864.951894] kmem_cache_alloc_noprof+0x72/0x680 [ 864.951919] ? __pfx_map_id_range_down+0x10/0x10 [ 864.951962] ? security_inode_alloc+0x3e/0x130 [ 864.951983] security_inode_alloc+0x3e/0x130 [ 864.952009] inode_init_always_gfp+0xc94/0xff0 [ 864.952048] alloc_inode+0x8d/0x250 [ 864.952085] new_inode+0x1e/0x160 [ 864.952125] __shmem_get_inode+0x17c/0xe80 [ 864.952172] __shmem_file_setup+0x107/0x370 [ 864.952216] alloc_file+0x11c/0x500 [ 864.952245] __x64_sys_memfd_create+0x193/0x280 [ 864.952275] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 864.952318] do_syscall_64+0xbf/0x390 [ 864.952358] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 864.952382] RIP: 0033:0x7efc34339b19 [ 864.952401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 864.952423] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 864.952447] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34339b19 [ 864.952463] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007efc343930fb [ 864.952477] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 864.952500] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 864.952514] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012e00 [ 864.952552] 13:31:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3d, &(0x7f0000000000)={0x1000}) 13:31:12 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc0189436, &(0x7f0000000000)={0x1000}) 13:31:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3d, &(0x7f0000000000)) 13:31:12 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b33, &(0x7f0000000000)={0x1000}) 13:31:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)) 13:31:12 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "c770cc", 0x38, 0x2c, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, {[@routing={0x6, 0x0, 0x0, 0x1}], @time_exceed={0x5, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "b07b00", 0x0, 0x0, 0x0, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}}}}}, 0x0) syz_emit_ethernet(0xf8, &(0x7f0000000080)={@local, @local, @void, {@mpls_uc={0x8847, {[{0x9}, {0x6}], @ipv6=@tipc_packet={0x7, 0x6, "3546db", 0xba, 0x6, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, {[@srh={0x5e, 0x6, 0x4, 0x3, 0x7, 0x50, 0x20, [@private1, @remote, @mcast2]}, @srh={0x67, 0xc, 0x4, 0x6, 0x1, 0x40, 0x4, [@mcast1, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty, @empty, @empty]}], @payload_conn={{{0x1a, 0x0, 0x0, 0x1, 0x0, 0x6, 0x3, 0x2, 0x3, 0x0, 0x1, 0x7, 0x0, 0x0, 0x2, 0x6, 0x1, 0x4e24, 0x4e24}}, [0x0, 0x0]}}}}}}}, &(0x7f0000000180)={0x0, 0x2, [0x57f, 0x667, 0x705, 0xd98]}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:31:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 7) [ 865.198745] loop2: detected capacity change from 0 to 4 [ 865.204129] EXT4-fs (loop2): invalid inodes per group: 0 [ 865.204129] 13:31:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc020660b, &(0x7f0000000000)={0x1000}) 13:31:22 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b34, &(0x7f0000000000)={0x1000}) 13:31:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x0) 13:31:22 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:31:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)) 13:31:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 8) 13:31:22 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b44, &(0x7f0000000000)) 13:31:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b44, &(0x7f0000000000)={0x1000}) [ 875.433899] FAULT_INJECTION: forcing a failure. [ 875.433899] name failslab, interval 1, probability 0, space 0, times 0 [ 875.435611] CPU: 0 UID: 0 PID: 7319 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 875.435639] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 875.435652] Call Trace: [ 875.435660] [ 875.435668] dump_stack_lvl+0xfa/0x120 [ 875.435709] should_fail_ex+0x4d7/0x5e0 [ 875.435737] ? __d_alloc+0x31/0xa10 [ 875.435766] should_failslab+0xc2/0x120 [ 875.435798] kmem_cache_alloc_lru_noprof+0x76/0x680 [ 875.435824] ? find_held_lock+0x2b/0x80 [ 875.435868] ? __d_alloc+0x31/0xa10 [ 875.435895] __d_alloc+0x31/0xa10 [ 875.435923] ? mpol_shared_policy_init+0x24f/0x390 [ 875.435958] d_alloc_pseudo+0x1d/0xc0 [ 875.435979] alloc_file_pseudo+0xbe/0x220 [ 875.436003] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 875.436024] ? __shmem_get_inode+0x682/0xe80 [ 875.436066] __shmem_file_setup+0x1a7/0x370 [ 875.436105] alloc_file+0x11c/0x500 [ 875.436131] __x64_sys_memfd_create+0x193/0x280 [ 875.436158] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 875.436197] do_syscall_64+0xbf/0x390 [ 875.436233] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 875.436255] RIP: 0033:0x7efc34339b19 [ 875.436272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 875.436292] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 875.436313] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34339b19 [ 875.436327] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007efc343930fb [ 875.436340] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 875.436353] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 875.436365] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012e00 [ 875.436402] 13:31:22 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)) 13:31:22 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = getpid() perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0x2, 0x3, 0x0, 0x400, 0x65, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x1, 0xfffffffffffffffe}, 0x4, 0x0, 0x0, 0x6, 0x9, 0x400, 0x6, 0x0, 0x5, 0x0, 0x8}, r2, 0x4, r0, 0x2) r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)={0x90000000}) 13:31:22 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b35, &(0x7f0000000000)={0x1000}) 13:31:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)) 13:31:22 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) r3 = msgget$private(0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) pidfd_getfd(0xffffffffffffffff, r4, 0x0) msgctl$IPC_RMID(r3, 0x0) r5 = pidfd_getfd(r2, r2, 0x0) pidfd_getfd(r5, r0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) r8 = getpid() pidfd_open(r8, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f00000001c0)={{0x2, 0xee00, 0xffffffffffffffff, r6, r7, 0x58, 0x5}, 0x0, 0x0, 0x9, 0x1000, 0x400, 0xf000000000000000, 0x3, 0x0, 0x8, 0x1, r8, r9}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:31:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:31:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 9) 13:31:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:31:22 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) [ 875.666756] loop2: detected capacity change from 0 to 4 13:31:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0x1000}) [ 875.683274] EXT4-fs (loop2): invalid inodes per group: 0 [ 875.683274] 13:31:32 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)={0x1000}) 13:31:32 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b47, &(0x7f0000000000)) 13:31:32 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000, 0x1000000}) 13:31:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b47, &(0x7f0000000000)={0x1000}) 13:31:32 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) pidfd_getfd(r3, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:31:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 10) 13:31:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)) 13:31:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) [ 885.729143] FAULT_INJECTION: forcing a failure. [ 885.729143] name failslab, interval 1, probability 0, space 0, times 0 [ 885.730170] CPU: 0 UID: 0 PID: 7361 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 885.730193] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 885.730201] Call Trace: [ 885.730205] [ 885.730210] dump_stack_lvl+0xfa/0x120 [ 885.730235] should_fail_ex+0x4d7/0x5e0 [ 885.730251] ? alloc_empty_file+0x58/0x1e0 [ 885.730263] should_failslab+0xc2/0x120 [ 885.730281] kmem_cache_alloc_noprof+0x72/0x680 [ 885.730296] ? d_instantiate+0x79/0xa0 [ 885.730318] ? alloc_empty_file+0x58/0x1e0 [ 885.730328] alloc_empty_file+0x58/0x1e0 [ 885.730341] alloc_file_pseudo+0x12b/0x220 [ 885.730353] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 885.730372] __shmem_file_setup+0x1a7/0x370 [ 885.730395] alloc_file+0x11c/0x500 [ 885.730410] __x64_sys_memfd_create+0x193/0x280 [ 885.730425] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 885.730446] do_syscall_64+0xbf/0x390 [ 885.730467] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 885.730483] RIP: 0033:0x7efc34339b19 [ 885.730492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 885.730503] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 885.730515] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34339b19 [ 885.730523] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007efc343930fb [ 885.730533] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 885.730541] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 885.730548] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012e00 [ 885.730567] 13:31:32 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b37, &(0x7f0000000000)={0x1000}) 13:31:32 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:31:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 11) [ 885.852313] loop2: detected capacity change from 0 to 4 13:31:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b48, &(0x7f0000000000)={0x1000}) [ 885.863876] EXT4-fs (loop2): invalid inodes per group: 0 [ 885.863876] 13:31:32 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b48, &(0x7f0000000000)) 13:31:32 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x44048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000100)={{r0}, {@val, @max}}) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000040)={0x1b, 0x4, 0x3, 0x101, 0x2, "e5893712632eace5"}) 13:31:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) 13:31:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 12) 13:31:32 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) r4 = epoll_create1(0x0) r5 = getpid() r6 = getpid() r7 = pidfd_open(r6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r7, &(0x7f0000000000)) r8 = getpid() r9 = pidfd_open(r8, 0x0) kcmp$KCMP_EPOLL_TFD(r5, r5, 0x7, r9, &(0x7f0000000040)={r4, r7, 0x8001}) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r10, &(0x7f0000000040)=""/102, 0x66) kcmp$KCMP_EPOLL_TFD(r2, r5, 0x7, r10, &(0x7f0000000040)={r1, r0, 0x1ff}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) 13:31:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(0xffffffffffffffff, 0x1) [ 885.998520] FAULT_INJECTION: forcing a failure. [ 885.998520] name failslab, interval 1, probability 0, space 0, times 0 [ 885.999517] CPU: 0 UID: 0 PID: 7395 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 885.999534] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 885.999542] Call Trace: [ 885.999547] [ 885.999551] dump_stack_lvl+0xfa/0x120 [ 885.999577] should_fail_ex+0x4d7/0x5e0 [ 885.999593] ? security_file_alloc+0x35/0x130 [ 885.999607] should_failslab+0xc2/0x120 [ 885.999626] kmem_cache_alloc_noprof+0x72/0x680 [ 885.999640] ? __create_object+0x59/0x80 [ 885.999656] ? security_file_alloc+0x35/0x130 [ 885.999669] security_file_alloc+0x35/0x130 [ 885.999683] init_file+0x95/0x4c0 [ 885.999703] alloc_empty_file+0x76/0x1e0 [ 885.999716] alloc_file_pseudo+0x12b/0x220 [ 885.999728] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 885.999747] __shmem_file_setup+0x1a7/0x370 [ 885.999769] alloc_file+0x11c/0x500 [ 885.999784] __x64_sys_memfd_create+0x193/0x280 [ 885.999799] ? __pfx___x64_sys_memfd_create+0x10/0x10 [ 885.999819] do_syscall_64+0xbf/0x390 [ 885.999840] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 885.999852] RIP: 0033:0x7efc34339b19 [ 885.999862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 885.999873] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 885.999885] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34339b19 13:31:33 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000080), &(0x7f00000000c0)={'L+', 0x80000000}, 0x16, 0x2) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) [ 885.999893] RDX: 00000000000009c0 RSI: 0000000000000000 RDI: 00007efc343930fb [ 885.999900] RBP: 0000000000000002 R08: 00000000000004e0 R09: ffffffffffffffff [ 885.999907] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 885.999914] R13: 0000000020000100 R14: 00000000000009c0 R15: 0000000020012e00 [ 885.999932] 13:31:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 13) 13:31:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:31:43 executing program 0: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) pipe(&(0x7f0000000300)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x80004, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_user}, {@cachetag={'cachetag', 0x3d, '--'}}, {@noextend}, {@posixacl}, {@access_any}], [{@appraise}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000040)={0xea, "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"}) 13:31:43 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:31:43 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000}) 13:31:43 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b49, &(0x7f0000000000)) 13:31:43 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) 13:31:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b49, &(0x7f0000000000)={0x1000}) [ 896.215174] loop2: detected capacity change from 0 to 4 [ 896.218796] EXT4-fs (loop2): invalid inodes per group: 0 [ 896.218796] 13:31:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 14) [ 896.290989] FAULT_INJECTION: forcing a failure. [ 896.290989] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 896.292070] CPU: 1 UID: 0 PID: 7430 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 896.292087] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 896.292094] Call Trace: [ 896.292099] [ 896.292105] dump_stack_lvl+0xfa/0x120 [ 896.292130] should_fail_ex+0x4d7/0x5e0 [ 896.292147] should_fail_alloc_page+0xe0/0x110 [ 896.292167] prepare_alloc_pages+0x1af/0x500 [ 896.292184] ? __pfx_perf_trace_lock+0x10/0x10 [ 896.292203] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 896.292216] ? __is_insn_slot_addr+0x2e/0x290 [ 896.292230] ? __is_insn_slot_addr+0x136/0x290 [ 896.292241] ? lock_release+0xc8/0x290 [ 896.292258] ? perf_trace_lock_acquire+0xc9/0x700 [ 896.292274] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 896.292289] ? perf_trace_lock+0xb5/0x5d0 [ 896.292307] ? __pfx_perf_trace_lock+0x10/0x10 [ 896.292322] ? lock_is_held_type+0x9e/0x120 [ 896.292341] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 896.292359] ? policy_nodemask+0xeb/0x4e0 [ 896.292375] alloc_pages_mpol+0xed/0x340 [ 896.292388] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 896.292399] ? filemap_get_entry+0x1bb/0x3b0 [ 896.292413] ? __pfx_filemap_get_entry+0x10/0x10 [ 896.292430] folio_alloc_mpol_noprof+0x38/0x2a0 [ 896.292448] shmem_alloc_folio+0x11b/0x140 [ 896.292468] shmem_get_folio_gfp.constprop.0+0x4ea/0x13a0 [ 896.292501] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 896.292524] ? __pfx_perf_trace_lock+0x10/0x10 [ 896.292538] ? simple_xattr_get+0x173/0x1d0 [ 896.292561] shmem_write_begin+0x147/0x2e0 [ 896.292574] ? __pfx_shmem_write_begin+0x10/0x10 [ 896.292585] ? timestamp_truncate+0x1eb/0x2f0 [ 896.292602] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 896.292617] ? __pfx_timestamp_truncate+0x10/0x10 [ 896.292637] generic_perform_write+0x391/0x810 [ 896.292663] ? __pfx_generic_perform_write+0x10/0x10 [ 896.292683] ? inode_needs_update_time.part.0+0x170/0x270 [ 896.292706] shmem_file_write_iter+0x111/0x140 [ 896.292725] vfs_write+0xbe9/0x1150 [ 896.292742] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 896.292758] ? __fget_files+0x34/0x3b0 [ 896.292773] ? __pfx_vfs_write+0x10/0x10 [ 896.292804] __x64_sys_pwrite64+0x1f1/0x260 [ 896.292821] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 896.292838] ? fput+0x6a/0x100 [ 896.292861] do_syscall_64+0xbf/0x390 [ 896.292882] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 896.292894] RIP: 0033:0x7efc342ecab7 [ 896.292903] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 896.292915] RSP: 002b:00007efc318aef20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 896.292926] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc342ecab7 [ 896.292934] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 896.292941] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 896.292949] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 896.292956] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 896.292975] 13:31:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) (fail_nth: 1) shutdown(r0, 0x1) [ 896.356360] FAULT_INJECTION: forcing a failure. [ 896.356360] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 896.357246] CPU: 1 UID: 0 PID: 7439 Comm: syz-executor.4 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 896.357261] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 896.357268] Call Trace: [ 896.357272] [ 896.357277] dump_stack_lvl+0xfa/0x120 [ 896.357299] should_fail_ex+0x4d7/0x5e0 [ 896.357314] _copy_from_user+0x30/0xd0 [ 896.357328] move_addr_to_kernel.part.0+0x40/0x120 [ 896.357346] __sys_connect+0xd4/0x1a0 [ 896.357362] ? __pfx___sys_connect+0x10/0x10 [ 896.357382] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 896.357396] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 896.357409] ? ksys_write+0x1a3/0x240 [ 896.357425] ? __pfx_ksys_write+0x10/0x10 [ 896.357444] __x64_sys_connect+0x73/0xb0 [ 896.357461] do_syscall_64+0xbf/0x390 [ 896.357484] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 896.357496] RIP: 0033:0x7f97e3305b19 [ 896.357505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 896.357516] RSP: 002b:00007f97e087b188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 896.357527] RAX: ffffffffffffffda RBX: 00007f97e3418f60 RCX: 00007f97e3305b19 [ 896.357535] RDX: 000000000000000e RSI: 0000000020001b00 RDI: 0000000000000005 [ 896.357542] RBP: 00007f97e087b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 896.357549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 896.357556] R13: 00007ffdb966b40f R14: 00007f97e087b300 R15: 0000000000022000 [ 896.357575] [ 896.379962] loop2: detected capacity change from 0 to 4 [ 896.387560] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 13:31:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4408, 0xf1e8, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000080)={r2, 0x2a3bab67, 0x9}) 13:31:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4a, &(0x7f0000000000)) 13:31:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) (fail_nth: 2) shutdown(r0, 0x1) 13:31:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) 13:31:53 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3b, &(0x7f0000000000)={0x1000}) 13:31:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 15) 13:31:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4a, &(0x7f0000000000)={0x1000}) 13:31:53 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3ff) r1 = epoll_create1(0x0) r2 = getpid() r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000001c0), 0x4) syz_emit_ethernet(0x26, &(0x7f00000003c0)={@link_local, @remote, @val={@void}, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @broadcast, "", @multicast}}}}, 0x0) r4 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000000000)) 13:31:53 executing program 5: ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)) 13:31:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4b, &(0x7f0000000000)={0x1000}) 13:31:53 executing program 5: ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)) [ 906.487016] FAULT_INJECTION: forcing a failure. [ 906.487016] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 906.488154] CPU: 0 UID: 0 PID: 7461 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 906.488171] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.488178] Call Trace: [ 906.488183] [ 906.488188] dump_stack_lvl+0xfa/0x120 [ 906.488213] should_fail_ex+0x4d7/0x5e0 [ 906.488226] ? page_copy_sane+0xce/0x2b0 [ 906.488251] copy_folio_from_iter_atomic+0x3d3/0x18c0 [ 906.488272] ? simple_xattr_get+0x173/0x1d0 [ 906.488294] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 906.488307] ? shmem_write_begin+0x15e/0x2e0 [ 906.488321] ? __pfx_shmem_write_begin+0x10/0x10 [ 906.488332] ? timestamp_truncate+0x1eb/0x2f0 [ 906.488349] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 906.488364] ? __pfx_timestamp_truncate+0x10/0x10 [ 906.488384] generic_perform_write+0x1d7/0x810 [ 906.488410] ? __pfx_generic_perform_write+0x10/0x10 [ 906.488430] ? inode_needs_update_time.part.0+0x170/0x270 [ 906.488453] shmem_file_write_iter+0x111/0x140 [ 906.488473] vfs_write+0xbe9/0x1150 [ 906.488495] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 906.488512] ? __fget_files+0x34/0x3b0 [ 906.488526] ? __pfx_vfs_write+0x10/0x10 [ 906.488557] __x64_sys_pwrite64+0x1f1/0x260 [ 906.488574] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 906.488590] ? fput+0x6a/0x100 [ 906.488614] do_syscall_64+0xbf/0x390 [ 906.488636] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 906.488649] RIP: 0033:0x7efc342ecab7 [ 906.488658] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 906.488669] RSP: 002b:00007efc318aef20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 906.488681] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc342ecab7 [ 906.488689] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 906.488696] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 906.488703] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 906.488710] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 906.488729] 13:31:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:31:53 executing program 5: ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)) [ 906.581535] loop2: detected capacity change from 0 to 4 [ 906.592540] EXT4-fs (loop2): invalid inodes per group: 0 [ 906.592540] 13:31:53 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3c, &(0x7f0000000000)={0x1000}) 13:31:53 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f00000014c0)) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001600)=ANY=[@ANYBLOB="3400009e842bfa08475eef5a", @ANYRES16=r7, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32=r8, @ANYBLOB="08002600a809000008009f00050000000800a00062090000"], 0x34}}, 0x0) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r4, &(0x7f0000001480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001440)={&(0x7f0000001640)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000129bd7000fedbdf2570000000eda39408000300fe1101ff2db6f16017eb04cf53d727eb866932ea436f33617c576e0a260a0069312ef3bae8341e082ec8ce9d437d3148b10f0850585e9bab43de36f3f889a4ff03e3a263108fa4da1f228488ae208eadba0a75aff4c17821837755ac049b06398030dd1f4c647e28b541e62f2124d70de0990c4fca6443d68141f2b6d3d4c270a9dae457c0f755189586d1f1c640ea78f2c5aa8624f414684ff581b8f671bd2406f487ee622d73596bc09512c468d668374c289d54b0952a5983304fe1f92fd3010d77033f362792fc9d4f50c6dec0db24404f41090ad5c542bfa671cb794c0ecc5526f9c168", @ANYRES32=r8, @ANYBLOB="0a00060008021100000100000a000600ffffffffffff00000a000600ffffffffffff00000a00060008021100000100000a000600ffffffffffff00000a00060008021100000000000a0006000802110000010000"], 0x70}, 0x1, 0x0, 0x0, 0x44000}, 0x20048800) read(r4, &(0x7f0000000040)=""/102, 0x66) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x1c, r7, 0x10, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x1f}, @void, @void}}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048010}, 0x20000080) pwritev2(r4, &(0x7f0000000280)=[{&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000040)="d6315cc8b9f7cab119021a99d9b172e07f13982f5a0879cdccd65c202be8bf0ae26782607961bf3cf44d334e7c6e4b263b2d2057eeeed1261bc84a1ba8de696efce62883f9fa49b59f4cf334b87e05dd7476c71e611382d4074c1c234843b5c105753539b95a0abb3766d2b9e6c3b909879a27da210785f5e7", 0x79}, {&(0x7f00000000c0)="ee3b1c1b9594149e1cbcd79a95ea76c8301469512fdd15ba0b4350bb331be97750bb99d0772fc3af488316b408aba7076570b03b9f7dcc8c7c3234b88b66ec0bfde7609b79d4189714485a28a41184155e4d7e06fca65d7729bd00ac172ce7ec759751bfe625bc4a40b0b1b1a8ab1a91b0ab033e7ccef1f8bc647f51b4b10bf5f436294cb28ba7507fac6a7ec62462286c2bd0655b51e1b052502fc4ee9983696be20de720f920506c02b642fffd23076bf9cf783e36e2c4b074a66ef4988aece0b73747245f727fa1c1700682e48ebaa6b484572acd22a95c8e30cfc3c645bb52ff8b2b6e", 0xe5}, {&(0x7f00000001c0)="e370abb280aea38fd4fac057ebc8fb7dcd73add460430cd4ea5a7a3782a7ed44c55c584bf4ade1f9d8495d3e983265a363e787d78435c384fcd6af61e27eb13ee10d818ff25de8071a2db1a37ca923c203196ec0f8f3ced4c72d5ac3634c68f06193d8cb830015a01c6de6ec5bf4cefb8987bc0fd2be582067c70358147637247e79df6f", 0x84}], 0x4, 0x8, 0x3f, 0x10) 13:31:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4b, &(0x7f0000000000)) 13:31:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:31:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 16) [ 906.713264] FAULT_INJECTION: forcing a failure. [ 906.713264] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 906.714473] CPU: 0 UID: 0 PID: 7489 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 906.714493] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.714500] Call Trace: [ 906.714505] [ 906.714509] dump_stack_lvl+0xfa/0x120 [ 906.714535] should_fail_ex+0x4d7/0x5e0 [ 906.714548] ? page_copy_sane+0xce/0x2b0 [ 906.714569] copy_folio_from_iter_atomic+0x3d3/0x18c0 [ 906.714595] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 906.714608] ? shmem_write_begin+0x15e/0x2e0 [ 906.714623] ? __pfx_shmem_write_begin+0x10/0x10 [ 906.714634] ? timestamp_truncate+0x1eb/0x2f0 [ 906.714652] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 906.714668] ? __pfx_timestamp_truncate+0x10/0x10 [ 906.714688] generic_perform_write+0x1d7/0x810 [ 906.714715] ? __pfx_generic_perform_write+0x10/0x10 [ 906.714735] ? inode_needs_update_time.part.0+0x170/0x270 [ 906.714759] shmem_file_write_iter+0x111/0x140 [ 906.714778] vfs_write+0xbe9/0x1150 [ 906.714795] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 906.714812] ? __fget_files+0x34/0x3b0 [ 906.714826] ? __pfx_vfs_write+0x10/0x10 [ 906.714857] __x64_sys_pwrite64+0x1f1/0x260 [ 906.714874] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 906.714890] ? fput+0x6a/0x100 [ 906.714914] do_syscall_64+0xbf/0x390 [ 906.714936] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 906.714949] RIP: 0033:0x7efc342ecab7 [ 906.714958] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 906.714969] RSP: 002b:00007efc318aef20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 906.714981] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc342ecab7 [ 906.714989] RDX: 000000000000001f RSI: 0000000020010100 RDI: 0000000000000004 [ 906.714996] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 906.715004] R10: 00000000000004e0 R11: 0000000000000293 R12: 0000000000000004 [ 906.715011] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 906.715030] [ 906.778711] loop2: detected capacity change from 0 to 4 [ 906.797226] EXT4-fs (loop2): invalid inodes per group: 0 [ 906.797226] 13:32:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)) 13:32:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) 13:32:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 17) 13:32:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_INTERFACE(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)={0x30, r2, 0x16566fdb4c104121, 0x0, 0x0, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan3\x00'}, @NL802154_ATTR_IFTYPE={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x30}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000007c0), r4) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000180)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x24, r5, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r7}]}, 0x24}}, 0x0) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x7f}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x4}, @NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000800}, 0x4841) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r8, 0x4b4c, &(0x7f0000000000)={0x1000}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 13:32:03 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) fsconfig$FSCONFIG_SET_STRING(r3, 0x1, &(0x7f0000000040)='{\xf2\x00', &(0x7f0000000080)=']\x00', 0x0) 13:32:03 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3d, &(0x7f0000000000)={0x1000}) 13:32:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) 13:32:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x1000}) [ 916.968669] FAULT_INJECTION: forcing a failure. [ 916.968669] name failslab, interval 1, probability 0, space 0, times 0 [ 916.969884] CPU: 0 UID: 0 PID: 7513 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 916.969903] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 916.969912] Call Trace: [ 916.969918] [ 916.969923] dump_stack_lvl+0xfa/0x120 [ 916.969951] should_fail_ex+0x4d7/0x5e0 [ 916.969969] ? getname_flags.part.0+0x48/0x540 [ 916.969983] should_failslab+0xc2/0x120 [ 916.970005] kmem_cache_alloc_noprof+0x72/0x680 [ 916.970026] ? getname_flags.part.0+0x48/0x540 [ 916.970038] getname_flags.part.0+0x48/0x540 [ 916.970053] getname_flags+0x95/0xe0 [ 916.970070] do_sys_openat2+0x9f/0x1b0 [ 916.970084] ? __pfx_do_sys_openat2+0x10/0x10 [ 916.970107] __x64_sys_openat+0x142/0x200 [ 916.970120] ? __pfx___x64_sys_openat+0x10/0x10 [ 916.970135] ? fput+0x6a/0x100 [ 916.970161] do_syscall_64+0xbf/0x390 [ 916.970183] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 916.970196] RIP: 0033:0x7efc342eca04 [ 916.970206] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 916.970218] RSP: 002b:00007efc318aeed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 916.970231] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc342eca04 [ 916.970240] RDX: 0000000000000002 RSI: 00007efc318af000 RDI: 00000000ffffff9c [ 916.970248] RBP: 00007efc318af000 R08: 0000000000000000 R09: ffffffffffffffff [ 916.970256] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 916.970263] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 916.970283] 13:32:04 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x10000006}) r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) epoll_wait(r1, &(0x7f0000000100)=[{}, {}, {}, {}], 0x4, 0xabb) 13:32:04 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)) 13:32:04 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b44, &(0x7f0000000000)={0x1000}) 13:32:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 18) 13:32:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)) 13:32:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4e, &(0x7f0000000000)={0x1000}) [ 917.079288] loop2: detected capacity change from 0 to 4 [ 917.095249] EXT4-fs (loop2): invalid inodes per group: 0 [ 917.095249] 13:32:04 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x4) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000140)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCGETS(r3, 0x5401, &(0x7f0000000040)) r4 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x9, 0x0, 0x4, 0x0, 0x0, 0x102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4}, 0x2102, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000000200)={0x1, 0x1, 0x9, 0x3, 0x125, &(0x7f00000007c0)}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r7, &(0x7f0000000040)=""/102, 0x66) ioctl$PIO_FONTX(r7, 0x4b6c, &(0x7f0000000180)={0x133, 0x17, &(0x7f00000003c0)="d29ede05b1df2265ebf63185a8d48756d6f4b21c1003bae5065421bece94f1ddb397df5324bca352dd297708a62ae633c05a4c7a6847ee7c42c73691769d8a2af3a1830075df674eabbf8960c89f6aae9983f789bd1afc2b3939eb320b516152ac39c747e790b183acf4d9dc9500373dfa12e1f9b319e4c929af06ed0981b58a74e1d0ee140956b7bfe406ab275fd49b62ec3f9726a30a6731d67721a2087cb419987d4563e9f97afc458c03108341453cbb1df913490e69cab8c656461c6a1d41ff99b05bbeef7c5064871830cb852d6e5c9152c07d032987f28f54b963ad811d2b0f96d7517e6403905ccea86d03df2cf3981389ddfa5ed73225b7751d7c2267c014d7881dee04f3e1396a06a557ffb6503f5fbe4acd5cb47ee0e15430de641aa1144afe51ddfc2339c6a94dfd73cb1c32254f71b2181c1309d58ec2bd729943c8f7613ea1b7d61bf4807b37797eb63191e0d53436e7769f9b023ec13cbc5a8adb1cd8104094de4d6bf518b683f0b046fc5de8a9ea15f947b703f3d42b9ac450b732e92c0e6e1c26d728f4f2c12ec7f1d7ab91ee6691a6c7daddde128f817437ab74653ec73a7f8690829112d842935f412eb8ff547d759d70b5424d943baf9ebea5db40dc8680da948075d7ea865651f19a2b602abf7d9f7ecf7e9facf92fc1270bd60b65b18a27494bdf323991f34baab598544fe62ab7937102d66ebecab12a32e85188fbc0a1ac37f6ea3b547347323b892c7a5bdacc7be80eece86023461bfd4e709706d8f79e43a3b1787d310970b71e428d86da323b8878bcf3f4e24e2296782fa223b1a3f0cc638574351850435483ea3deea0167b64eea69f3451550f9791b5579bd36dd020aa134992924e3cf72cdccb259a326f29c4ada860a347265081a54d3cf322bfbfaa1ebb5e5b1f9d319a311b8bb1e45d689f927deb216974d8207155b53d66503ba57d7d3d1bf82e35327f3af373b872c28de3732beecc26881549b0d72a6a774c4a4284d136c27fb759f425a6b030e08189f78d74fa3721e0ae35b7e17e62a62af7dd74475b1c00be327916cde3609e6aeee7afeeaa8cc9ef18824ecae26f4397818518b4fb86ce24453260f1c67967027e1254599673e1e297471cf7ac3f549418da7116cf80d76ebecc73c18ecb86f3fc075ef99b5c19068f6fc1f28a6a8f0a31e6c0d320d5e6361f552a00fbe3c8a8428001969dd9641adca1d941e1824fe66b93fd9feaa1956f56db83b350514db275dbf1adad346287f67ebac749d4f91877c220747dd66d76c134be6a50fdf84e82689054a22316ff6f3ce9f1a6a565d8a01910341cb2494a0d5658cc54d8698ffde23ad8c7f615074672141941dfad8a7910d32471eb2a0f32005faa1fe16e6a2175dd4922edf469e3676342cd8758d5744a255466d2e3b3ce15c65ea8593f853c865fe87f"}) read(r6, &(0x7f0000000040)=""/102, 0x66) dup2(r4, r6) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:32:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x2, @fixed}, 0xe) shutdown(r0, 0x1) 13:32:14 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)) 13:32:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCL_GETSHIFTSTATE(r0, 0x541c, &(0x7f0000000040)={0x6, 0x9}) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x40) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f00000000c0)={0x1e2, 0x16, &(0x7f00000003c0)}) r3 = epoll_create1(0x0) r4 = getpid() r5 = getpid() r6 = getpgrp(r4) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x3, 0x2, 0x6b, 0x0, 0x0, 0x10000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000001c0), 0x5}, 0xc000, 0x2, 0x7f, 0x6, 0x1, 0x5d, 0x2, 0x0, 0xbb8a, 0x0, 0x3f}, r6, 0x0, 0xffffffffffffffff, 0x0) r7 = pidfd_open(r5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r7, &(0x7f0000000000)) r8 = getpid() r9 = pidfd_open(r8, 0x0) kcmp$KCMP_EPOLL_TFD(r4, r4, 0x7, r9, &(0x7f0000000040)={r3, r7, 0x8001}) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0xda, 0x0, 0x20, 0x5, 0x0, 0x2388, 0x400, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xd}, 0x2000, 0x1, 0x133, 0x6, 0xff, 0x3, 0x1, 0x0, 0xfffffcac, 0x0, 0xdd46}, r4, 0xf, r1, 0x19) 13:32:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 19) 13:32:14 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0x1000}) 13:32:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4e, &(0x7f0000000000)) 13:32:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b62, &(0x7f0000000000)={0x1000}) 13:32:14 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) [ 927.584062] FAULT_INJECTION: forcing a failure. [ 927.584062] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 927.584092] CPU: 0 UID: 0 PID: 7552 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 927.584109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 927.584116] Call Trace: [ 927.584121] 13:32:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 20) 13:32:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x5, @fixed}, 0xe) shutdown(r0, 0x1) [ 927.584126] dump_stack_lvl+0xfa/0x120 [ 927.584151] should_fail_ex+0x4d7/0x5e0 [ 927.584169] strncpy_from_user+0x3b/0x2f0 [ 927.584190] getname_flags.part.0+0x8d/0x540 [ 927.584206] getname_flags+0x95/0xe0 [ 927.584223] do_sys_openat2+0x9f/0x1b0 [ 927.584236] ? __pfx_do_sys_openat2+0x10/0x10 [ 927.584258] __x64_sys_openat+0x142/0x200 [ 927.584270] ? __pfx___x64_sys_openat+0x10/0x10 [ 927.584285] ? fput+0x6a/0x100 [ 927.584309] do_syscall_64+0xbf/0x390 [ 927.584330] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 927.584343] RIP: 0033:0x7efc342eca04 [ 927.584353] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 927.584364] RSP: 002b:00007efc318aeed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 927.584377] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc342eca04 [ 927.584385] RDX: 0000000000000002 RSI: 00007efc318af000 RDI: 00000000ffffff9c [ 927.584392] RBP: 00007efc318af000 R08: 0000000000000000 R09: ffffffffffffffff [ 927.584400] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 927.584407] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 927.584426] [ 927.679602] FAULT_INJECTION: forcing a failure. [ 927.679602] name failslab, interval 1, probability 0, space 0, times 0 [ 927.681962] CPU: 0 UID: 0 PID: 7574 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 927.681980] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 927.681989] Call Trace: [ 927.681993] [ 927.681998] dump_stack_lvl+0xfa/0x120 [ 927.682025] should_fail_ex+0x4d7/0x5e0 [ 927.682042] ? alloc_empty_file+0x58/0x1e0 [ 927.682054] should_failslab+0xc2/0x120 [ 927.682075] kmem_cache_alloc_noprof+0x72/0x680 [ 927.682090] ? __is_insn_slot_addr+0x140/0x290 [ 927.682109] ? alloc_empty_file+0x58/0x1e0 [ 927.682120] alloc_empty_file+0x58/0x1e0 [ 927.682133] path_openat+0xe0/0x2880 [ 927.682152] ? perf_trace_lock_acquire+0xc9/0x700 [ 927.682171] ? perf_trace_lock_acquire+0xc9/0x700 [ 927.682192] ? __pfx_path_openat+0x10/0x10 [ 927.682209] ? perf_trace_lock_acquire+0xc9/0x700 [ 927.682230] do_filp_open+0x1e8/0x450 [ 927.682246] ? __pfx_do_filp_open+0x10/0x10 [ 927.682271] ? find_held_lock+0x2b/0x80 [ 927.682291] ? alloc_fd+0x2c1/0x560 [ 927.682306] ? lock_release+0xc8/0x290 [ 927.682324] ? _raw_spin_unlock+0x1e/0x40 [ 927.682340] ? alloc_fd+0x2c1/0x560 [ 927.682361] do_sys_openat2+0x104/0x1b0 [ 927.682375] ? __pfx_do_sys_openat2+0x10/0x10 [ 927.682397] __x64_sys_openat+0x142/0x200 [ 927.682410] ? __pfx___x64_sys_openat+0x10/0x10 [ 927.682426] ? fput+0x6a/0x100 [ 927.682450] do_syscall_64+0xbf/0x390 [ 927.682472] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 927.682490] RIP: 0033:0x7efc342eca04 [ 927.682500] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 927.682512] RSP: 002b:00007efc318aeed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 927.682525] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc342eca04 [ 927.682533] RDX: 0000000000000002 RSI: 00007efc318af000 RDI: 00000000ffffff9c [ 927.682542] RBP: 00007efc318af000 R08: 0000000000000000 R09: ffffffffffffffff [ 927.682550] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 927.682557] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 927.682576] 13:32:14 executing program 6: r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="443a30f38c5eeb93fcf5a6f94f8ade21151c60660df634df826687174f9bfe6fcbb725447f2105c72db0e4807c7c57aa7cf0cdc9b1984fb8932af513087ecede40aacf710321a4131374795aeb82d30d185f280fafa2d2c2e0cd6dd0cff5fd2b529bd3f90647793092d06ff2e936e2d2c0e3f33af584e8fd91b4f7a2eaeb5464c0239941f2a933cb3749694d149cc2ef3cc78fb7f12318f3b25355c84293bc1fe0c68801047397d4eb2e5fd185ba2c", 0xaf, 0x7}, {&(0x7f0000000180)="52dc507a97731c4d3826b24a28f9097dec74b8e6c39c4ef59a86f8318bcfa9381a7e339ccfcc53acd0ad4e509bed88ec8f226e0eb3ee596dd6bfc4a11de0b1287481cd68e450239c6dc4ee54e5c30bfe9fe3965141290422b730c80a9fc7", 0x5e, 0x7}], 0x48081, &(0x7f0000000240)=ANY=[@ANYBLOB="6e725f696e6f6465733d653478652c6e725f696e6f6465733d7025322c6d6f64653d30303030303030303030303030303030303030303030342c6e725f696e6f6465733d38706b2c646f6e745f686173682c660917be4c723e", @ANYRESDEC=0xee01, @ANYBLOB="0080"]) fdatasync(r0) perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) 13:32:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:32:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b63, &(0x7f0000000000)={0x1000}) 13:32:14 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)) 13:32:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)) 13:32:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 21) 13:32:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b62, &(0x7f0000000000)) 13:32:14 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b47, &(0x7f0000000000)={0x1000}) 13:32:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) [ 927.872740] loop2: detected capacity change from 0 to 4 [ 927.881561] EXT4-fs (loop2): invalid inodes per group: 0 [ 927.881561] 13:32:14 executing program 0: ioctl$AUTOFS_IOC_EXPIRE_MULTI(0xffffffffffffffff, 0x40049366, &(0x7f0000000040)=0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:32:24 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) getpid() epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:32:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x7, @fixed}, 0xe) shutdown(r0, 0x1) 13:32:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f00000000c0)={0x1, 0x0, 0x4, 0xe, 0x1cc, &(0x7f00000003c0)}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000080)={0x7ff, 0x8, 0x3, 0x0, 0x3, 0x9}) ioctl$TIOCNXCL(r0, 0x540d) 13:32:24 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b48, &(0x7f0000000000)={0x1000}) 13:32:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, 0x0) 13:32:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b65, &(0x7f0000000000)={0x1000}) 13:32:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b63, &(0x7f0000000000)) 13:32:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 22) [ 937.738808] loop2: detected capacity change from 0 to 4 [ 937.744855] EXT4-fs (loop2): invalid inodes per group: 0 [ 937.744855] 13:32:24 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b49, &(0x7f0000000000)={0x1000}) 13:32:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 23) 13:32:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, 0x0) [ 937.862360] loop2: detected capacity change from 0 to 4 [ 937.873375] EXT4-fs (loop2): invalid inodes per group: 0 [ 937.873375] 13:32:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b72, &(0x7f0000000000)={0x1000}) 13:32:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x9, @fixed}, 0xe) shutdown(r0, 0x1) 13:32:36 executing program 0: ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:32:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, 0x0) 13:32:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)) 13:32:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 24) 13:32:36 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x7a, 0xff, 0x0, 0x4, 0x0, 0x80000000, 0x8a408, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f00000001c0), 0x2}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x4, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x40000002}) r4 = getpid() r5 = pidfd_open(r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r5, &(0x7f0000000000)={0x2004}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r7 = openat(r2, &(0x7f0000000200)='./file0\x00', 0x30000, 0xa0) process_madvise(r7, &(0x7f0000000300)=[{&(0x7f0000000240)="d5b4ec93d1227a209e219090bad0cd463441126d21df5b4d85a029137881e0a70b21e65f9b176cb8512aefdded951f33eb4748d34195d8f4a6c58753e20707520e8d019475a459afa5ad7ba04c2bb29c3c59d46db900692dba71cb4c868925b061f9c43fd08cafe0bb97b31a08a562483ce40bea5cc87ded3d7319ba2d0716b0ca0ef02abbbba207fc12cb2df6a5d74ec992b5da12156f63564fca215880ce166e", 0xa1}], 0x1, 0x17, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) write$binfmt_aout(r3, &(0x7f00000003c0)={{0x10b, 0xb5, 0x2, 0x376, 0x166, 0x7ff, 0x13f, 0x2}, "8d650eeb26916bcd843c634f3e99bef7c93c6af0c2dbcf9056a011d8834eb904d288b103a4c44e89d31fedc64a49104139be8e07248f8d7217adcb2b084d8334d49cdb13589525f4869b89facf27f0475d0e5d0359138486d56c8d110e3e189ef21f80267b7cd5498e431dd2deab2bbfbdd64f0cb744c188fa5c24a3642651ee1536bd30db588f315b417f147c8252f331a8b858cfa0af5ad5928fcb40e96193f0a71b10638680ce75d8cf188a2b65051d969abf3f2ba080a6d8f0d61167deebf7369c261a06c3134acf2a91898ca0642a4edc68370a0b2c6e0ecfa8d69b", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5fe) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r6, 0x80286722, &(0x7f0000000180)={&(0x7f0000000100)=""/94, 0x5e, 0x9, 0xa9}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0xd7, 0x3, 0x6, 0x3, 0x0, 0x2, 0x8840, 0xc, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x807, 0x2, @perf_config_ext={0x9fa, 0xfffffffffb883703}, 0x4, 0xffffffffd89ca634, 0x1, 0x7, 0x1, 0x9, 0x8000, 0x0, 0x80000001, 0x0, 0x1000}, r4, 0x10, r0, 0x5) 13:32:36 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4a, &(0x7f0000000000)={0x1000}) 13:32:36 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x7, @fixed}, 0xe) shutdown(r0, 0x1) 13:32:36 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4b, &(0x7f0000000000)={0x1000}) [ 949.889551] FAULT_INJECTION: forcing a failure. [ 949.889551] name failslab, interval 1, probability 0, space 0, times 0 [ 949.890498] CPU: 0 UID: 0 PID: 7659 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 949.890515] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 949.890522] Call Trace: [ 949.890527] [ 949.890532] dump_stack_lvl+0xfa/0x120 [ 949.890557] should_fail_ex+0x4d7/0x5e0 [ 949.890574] ? __kernfs_new_node+0xd3/0x870 [ 949.890593] should_failslab+0xc2/0x120 [ 949.890612] kmem_cache_alloc_noprof+0x72/0x680 [ 949.890627] ? perf_trace_lock_acquire+0xc9/0x700 [ 949.890648] ? __kernfs_new_node+0xd3/0x870 [ 949.890665] __kernfs_new_node+0xd3/0x870 [ 949.890686] ? __pfx___kernfs_new_node+0x10/0x10 [ 949.890709] ? lock_acquire+0x15e/0x2f0 [ 949.890722] ? kernfs_root+0x23/0x2a0 [ 949.890740] ? find_held_lock+0x2b/0x80 [ 949.890758] ? kernfs_root+0xee/0x2a0 [ 949.890775] ? lock_release+0xc8/0x290 [ 949.890787] ? lock_is_held_type+0x9e/0x120 [ 949.890809] kernfs_new_node+0x13c/0x1e0 [ 949.890826] kernfs_create_dir_ns+0x4d/0x1a0 [ 949.890841] internal_create_group+0xa7f/0xeb0 [ 949.890862] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 949.890885] ? __pfx_internal_create_group+0x10/0x10 [ 949.890903] ? blk_validate_limits+0xc27/0x15c0 [ 949.890933] ? lock_is_held_type+0x9e/0x120 [ 949.890952] loop_configure+0xc42/0x1590 [ 949.890987] ? __pfx_loop_configure+0x10/0x10 [ 949.891014] ? avc_has_extended_perms+0x107/0xf20 [ 949.891030] ? find_held_lock+0x2b/0x80 [ 949.891048] ? avc_has_extended_perms+0x23b/0xf20 [ 949.891062] ? lock_release+0xc8/0x290 [ 949.891078] lo_ioctl+0x66d/0x1c70 [ 949.891098] ? __pfx_lo_ioctl+0x10/0x10 [ 949.891111] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 949.891127] ? __pfx_perf_trace_lock+0x10/0x10 [ 949.891145] ? lock_acquire+0x15e/0x2f0 [ 949.891158] ? __virt_addr_valid+0x1c6/0x5d0 [ 949.891179] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 949.891194] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 949.891206] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 949.891218] ? lock_release+0xc8/0x290 [ 949.891234] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 949.891272] ? down_read_nested+0x350/0x470 [ 949.891288] ? __fget_files+0x34/0x3b0 [ 949.891303] ? find_held_lock+0x2b/0x80 [ 949.891321] ? __fget_files+0x203/0x3b0 [ 949.891336] ? __pfx_lo_ioctl+0x10/0x10 [ 949.891350] blkdev_ioctl+0x27c/0x6d0 [ 949.891368] ? __pfx_blkdev_ioctl+0x10/0x10 [ 949.891384] ? selinux_file_ioctl+0xb9/0x280 [ 949.891405] ? __pfx_blkdev_ioctl+0x10/0x10 [ 949.891423] __x64_sys_ioctl+0x18f/0x210 [ 949.891438] do_syscall_64+0xbf/0x390 [ 949.891458] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 949.891471] RIP: 0033:0x7efc343398d7 [ 949.891484] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 949.891495] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 949.891507] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc343398d7 [ 949.891515] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 949.891522] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 949.891529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 949.891536] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 949.891555] [ 949.917864] loop2: detected capacity change from 0 to 4 [ 949.985841] EXT4-fs (loop2): invalid inodes per group: 0 [ 949.985841] 13:32:37 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b65, &(0x7f0000000000)) 13:32:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBLED(r0, 0x4b65, 0x1000) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1020}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x400080, 0x0) read(r1, &(0x7f0000000100)=""/113, 0x71) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000040)=0x7fffffff) 13:32:37 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:32:37 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4156}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) r3 = getpid() pidfd_open(r3, 0x0) r4 = getpid() pidfd_open(r4, 0x0) r5 = getpid() pidfd_open(r5, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) getpid() clone3(&(0x7f00000003c0)={0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x27}, &(0x7f0000000100)=""/174, 0xae, &(0x7f00000001c0)=""/227, &(0x7f00000002c0)=[r1, r1, r1, r3, r1, r4, r5, r1], 0x8, {r6}}, 0x58) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:32:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4bfa, &(0x7f0000000000)={0x1000}) 13:32:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 25) [ 950.138707] loop2: detected capacity change from 0 to 4 [ 950.153449] EXT4-fs (loop2): invalid inodes per group: 0 [ 950.153449] 13:32:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x9, @fixed}, 0xe) shutdown(r0, 0x1) 13:32:49 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:32:49 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0xb, @fixed}, 0xe) shutdown(r0, 0x1) 13:32:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 26) 13:32:49 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x1000}) 13:32:49 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b72, &(0x7f0000000000)) 13:32:49 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() socket$inet6_tcp(0xa, 0x1, 0x0) r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:32:49 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4bfb, &(0x7f0000000000)={0x1000}) [ 962.928459] loop2: detected capacity change from 0 to 4 [ 962.958592] EXT4-fs (loop2): invalid inodes per group: 0 [ 962.958592] 13:32:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xad, 0x0, 0x7f, 0x7f, 0x0, 0x3, 0xd4230, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000040)}, 0x400, 0x2, 0x8, 0x6, 0x3, 0x3ff, 0x7, 0x0, 0x1000, 0x0, 0x6}, 0xffffffffffffffff, 0x4, r1, 0x1) 13:32:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5409, &(0x7f0000000000)={0x1000}) 13:32:50 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4e, &(0x7f0000000000)={0x1000}) 13:32:50 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4bfa, &(0x7f0000000000)) 13:32:50 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x800) r2 = dup(r1) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) r3 = getpid() r4 = pidfd_open(r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)) 13:32:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 27) 13:32:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540b, &(0x7f0000000000)={0x1000}) 13:32:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000040)=""/109, 0x6d}, {&(0x7f00000000c0)=""/104, 0x68}, {&(0x7f0000000140)=""/171, 0xab}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/8, 0x8}, {&(0x7f0000000240)=""/137, 0x89}], 0x6, &(0x7f0000001440)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000014c0)={0x7, 0x1, 0x4e1a, 0x9, 0x2}) [ 963.284440] loop2: detected capacity change from 0 to 4 [ 963.301183] EXT4-fs (loop2): invalid inodes per group: 0 [ 963.301183] 13:33:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4bfb, &(0x7f0000000000)) 13:33:01 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:33:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x21, @fixed}, 0xe) shutdown(r0, 0x1) 13:33:01 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x9, @fixed}, 0xe) shutdown(r0, 0x1) 13:33:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540c, &(0x7f0000000000)={0x1000}) 13:33:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 28) 13:33:01 executing program 0: sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x9, 0xd}}}}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40884}, 0x48890) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000040)=0x3) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:33:01 executing program 6: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x327000, 0x0) ioctl$TIOCL_SETVESABLANK(r0, 0x541c, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x1000000000200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x5, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) [ 974.241919] FAULT_INJECTION: forcing a failure. [ 974.241919] name failslab, interval 1, probability 0, space 0, times 0 [ 974.243387] CPU: 1 UID: 0 PID: 7761 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 974.243413] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 974.243424] Call Trace: [ 974.243431] [ 974.243439] dump_stack_lvl+0xfa/0x120 [ 974.243480] should_fail_ex+0x4d7/0x5e0 [ 974.243505] ? __kernfs_new_node+0xd3/0x870 [ 974.243535] should_failslab+0xc2/0x120 [ 974.243565] kmem_cache_alloc_noprof+0x72/0x680 [ 974.243585] ? perf_trace_lock_acquire+0xc9/0x700 [ 974.243612] ? perf_trace_lock_acquire+0xc9/0x700 [ 974.243642] ? __kernfs_new_node+0xd3/0x870 [ 974.243669] __kernfs_new_node+0xd3/0x870 [ 974.243703] ? __pfx___kernfs_new_node+0x10/0x10 [ 974.243738] ? lock_acquire+0x15e/0x2f0 [ 974.243760] ? kernfs_root+0x23/0x2a0 [ 974.243788] ? find_held_lock+0x2b/0x80 [ 974.243817] ? kernfs_root+0xee/0x2a0 [ 974.243844] ? lock_release+0xc8/0x290 [ 974.243864] ? lock_is_held_type+0x9e/0x120 [ 974.243902] kernfs_new_node+0x13c/0x1e0 [ 974.243928] __kernfs_create_file+0x55/0x360 [ 974.243958] sysfs_add_file_mode_ns+0x21c/0x440 [ 974.243991] ? __pfx_dev_attr_store+0x10/0x10 [ 974.244019] internal_create_group+0x571/0xeb0 [ 974.244061] ? __pfx_internal_create_group+0x10/0x10 [ 974.244090] ? blk_validate_limits+0xc27/0x15c0 [ 974.244122] ? lock_is_held_type+0x9e/0x120 [ 974.244152] loop_configure+0xc42/0x1590 [ 974.244207] ? __pfx_loop_configure+0x10/0x10 [ 974.244251] ? avc_has_extended_perms+0x107/0xf20 [ 974.244277] ? find_held_lock+0x2b/0x80 [ 974.244305] ? avc_has_extended_perms+0x23b/0xf20 [ 974.244328] ? lock_release+0xc8/0x290 [ 974.244354] lo_ioctl+0x66d/0x1c70 [ 974.244386] ? __pfx_lo_ioctl+0x10/0x10 [ 974.244408] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 974.244434] ? __pfx_perf_trace_lock+0x10/0x10 [ 974.244463] ? lock_acquire+0x15e/0x2f0 [ 974.244484] ? __virt_addr_valid+0x1c6/0x5d0 [ 974.244516] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 974.244539] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 974.244558] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 974.244578] ? lock_release+0xc8/0x290 [ 974.244603] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 974.244667] ? down_read_nested+0x350/0x470 [ 974.244692] ? __fget_files+0x34/0x3b0 [ 974.244716] ? find_held_lock+0x2b/0x80 [ 974.244745] ? __fget_files+0x203/0x3b0 [ 974.244768] ? __pfx_lo_ioctl+0x10/0x10 [ 974.244792] blkdev_ioctl+0x27c/0x6d0 [ 974.244819] ? __pfx_blkdev_ioctl+0x10/0x10 [ 974.244846] ? selinux_file_ioctl+0xb9/0x280 [ 974.244879] ? __pfx_blkdev_ioctl+0x10/0x10 [ 974.244907] __x64_sys_ioctl+0x18f/0x210 [ 974.244931] do_syscall_64+0xbf/0x390 [ 974.244963] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 974.244983] RIP: 0033:0x7efc343398d7 [ 974.244997] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 974.245015] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 974.245034] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc343398d7 [ 974.245046] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 974.245058] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 974.245069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 974.245080] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 974.245111] [ 974.300633] loop2: detected capacity change from 0 to 4 [ 974.307593] EXT4-fs (loop2): invalid inodes per group: 0 [ 974.307593] 13:33:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5409, &(0x7f0000000000)) 13:33:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f00000000c0)={0x3, 0x5, 0x4000, 0x200}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x521002, 0x0) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000080)={0x9}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x3, 0x16, [0x400, 0x0, 0x4, 0x6, 0x7, 0x80000001], 0x2, &(0x7f0000000180)=[{}, {}], &(0x7f00000001c0)=""/22}, &(0x7f0000000280)=0x78) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCL_SCROLLCONSOLE(r2, 0x541c, &(0x7f0000000100)={0xd, 0x3e00000}) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000140)={0x1c4, 0x1c, &(0x7f00000003c0)}) 13:33:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540d, &(0x7f0000000000)={0x1000}) 13:33:01 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) pidfd_getfd(r2, r3, 0x0) 13:33:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 29) 13:33:01 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b62, &(0x7f0000000000)={0x1000}) [ 974.551791] loop2: detected capacity change from 0 to 4 [ 974.566673] EXT4-fs (loop2): invalid inodes per group: 0 [ 974.566673] 13:33:01 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b63, &(0x7f0000000000)={0x1000}) 13:33:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540e, &(0x7f0000000000)={0x1000}) 13:33:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540b, &(0x7f0000000000)) 13:33:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x20002000}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, &(0x7f0000000040)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) writev(r3, &(0x7f0000000680)=[{&(0x7f0000000100)="c7892512da60ecc8491b926966a659b05fe9f42c0e12414106c576271e1a2595e0fc9c15c1fa97e18829e719c69b7920e883254c95ff813dd932625dd23ac345f10291af4a5719dd21be3af3c22271c8147c0b9bc7cda62bd75cc8c429d152d758cc4232bc9e660f1abf51dafc243348b40589016efed8f5b3ca502fbb65df056ef763c23a85c1f2b372b6cfc566878193309977256d8b141eb8fa90b6a9ba100d6dc5cf15323f6392e068dd54f5c1918b3e96bc18d0463f4357857a573f322851f8285e55cb39f5e2b7c4069f7f24c2642a0832347c8d24a5fa8679b0691c76e45625346d", 0xe5}, {&(0x7f0000000200)="6e283c76efe7584b6db388cddc59fc84f571d63ba99a8855757febe8bdfc0c40e51a5b340a7a835a6807f10497ba12150ee659f85f4af483be5ee8018a2fb86381dff050a91bcc7c5ec0a4b20579b5d79d8590d1232d3ff87c0a95222aa82f07d4e8f7716eb53a530629073a07eefd3d450c39e55c411d37", 0x78}, {&(0x7f0000000280)="a7351231f86e4051f5b4c95fbb27c01142f3167009711fa5c48ad64b201632c46c24c717cc6fee1ed6dad6e4787229cb1b17b1b598128bf116ed114d1443e14bb81f25ba6834808ecdc6123b5110aceb71dff02bfa2ef7cd49bca638ae9605cb97a7588f0624bf059c13e873c30c647abbaacadc18387bfb9c3bf8d67b69327af778f19e6d90ef75c328463904223dabd0bdef4b0be75ff40145dd1d0ef041dc27484ad6930bf03d50bcab7f347652636c5e7ea24481bc1f28", 0xb9}, {&(0x7f00000003c0)="4739ef08f32fdd90286aa8f1b85f9b378e060654a216b864eb60b869f19e245e466432adc31db9b4630709d71e49b22da63eb79cc8139f971bedfe85b3d71b9b01dd2c3be29af3b64658d8769f8cb6f17d21d22cc7ba765437bde5686f0fda5f3fb8c3d5d23d8bf7f93258396c5f03f734a43b7e5a6ca605f1fed24cf1109e1cd57a03d81573308ed7574d7eb3395eda62904e7d1285c65092c4fc45b89f18e9931e52dfa70f46ff45ba7fd2ca6df0eeecb41f0639967f4d43d075eec101f3ee", 0xc0}, {&(0x7f0000000480)="27b5406cbc8f8bef4ac002c37a69ac03a9a0650306bc258b802b6de2574771e80dc002fd53ddeb503c49f7066ea84c87fdf4f78e8a1aeb916a948feed4d12c9fb1b837977484fb46c2bea7ffdb247241213d6fbd023523f022a2217b121be42b3bc1d20331d3149d2e59d8f66fcbfaed", 0x70}, {&(0x7f0000000500)="1a3da9d5dd4581b8d207a2262aa059c41fe07c3649328f2e5a750309", 0x1c}, {&(0x7f0000000540)="9cac08c52cb1d0d6ea8039b0db0ad3b7f772dad516ad35118bdc57bdff5c76da4cf263957fc32a5c9a9efc733f395da9029baddad9f643bba64bf222ff823edf04706dd3e49032daf45696b86349f6b224b6bebfd316f1fa81fed411532f95d2be804f706460435ca1b911051f788c2b01ad4cbc32ef4bc997e66b600b868c3e66f504cf1b7c0638d250d7bd4bf7bcc9c51f6c3a3db459473ea83467f35d59ecb02ef881d5b999f9f02fb505ae171fa54c8694aed9f02e7d7d03b1e135a75a5b8313b0acfff6e3feb77d7a4556ed399a2f0e", 0xd2}, {&(0x7f0000000640)="98b44ae85b7f345990fbf9b11d0e1833099e7437f505600dd61447d4f3ad4999122d012d38", 0x25}], 0x8) 13:33:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x82, @fixed}, 0xe) shutdown(r0, 0x1) 13:33:13 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)={0x2}) r3 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) 13:33:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:33:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0x1000}) 13:33:13 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)={0x1000}) 13:33:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 30) 13:33:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540c, &(0x7f0000000000)) 13:33:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540f, &(0x7f0000000000)={0x1000}) [ 986.158751] FAULT_INJECTION: forcing a failure. [ 986.158751] name failslab, interval 1, probability 0, space 0, times 0 [ 986.160693] CPU: 1 UID: 0 PID: 7834 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 986.160723] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 986.160735] Call Trace: [ 986.160743] [ 986.160751] dump_stack_lvl+0xfa/0x120 [ 986.160792] should_fail_ex+0x4d7/0x5e0 [ 986.160820] ? __kernfs_new_node+0xd3/0x870 [ 986.160853] should_failslab+0xc2/0x120 [ 986.160886] kmem_cache_alloc_noprof+0x72/0x680 [ 986.160913] ? perf_trace_lock_acquire+0xc9/0x700 [ 986.160950] ? __kernfs_new_node+0xd3/0x870 [ 986.160981] __kernfs_new_node+0xd3/0x870 [ 986.161020] ? __pfx___kernfs_new_node+0x10/0x10 [ 986.161060] ? lock_acquire+0x15e/0x2f0 [ 986.161085] ? kernfs_root+0x23/0x2a0 [ 986.161117] ? find_held_lock+0x2b/0x80 [ 986.161150] ? kernfs_root+0xee/0x2a0 [ 986.161182] ? lock_release+0xc8/0x290 [ 986.161205] ? lock_is_held_type+0x9e/0x120 [ 986.161244] kernfs_new_node+0x13c/0x1e0 [ 986.161274] __kernfs_create_file+0x55/0x360 [ 986.161308] sysfs_add_file_mode_ns+0x21c/0x440 [ 986.161345] ? __pfx_dev_attr_store+0x10/0x10 [ 986.161378] internal_create_group+0x571/0xeb0 [ 986.161425] ? __pfx_internal_create_group+0x10/0x10 [ 986.161459] ? blk_validate_limits+0xc27/0x15c0 [ 986.161502] ? lock_is_held_type+0x9e/0x120 [ 986.161537] loop_configure+0xc42/0x1590 [ 986.161600] ? __pfx_loop_configure+0x10/0x10 [ 986.161650] ? avc_has_extended_perms+0x107/0xf20 [ 986.161679] ? find_held_lock+0x2b/0x80 [ 986.161711] ? avc_has_extended_perms+0x23b/0xf20 [ 986.161738] ? lock_release+0xc8/0x290 [ 986.161768] lo_ioctl+0x66d/0x1c70 [ 986.161803] ? __pfx_lo_ioctl+0x10/0x10 [ 986.161828] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 986.161857] ? __pfx_perf_trace_lock+0x10/0x10 [ 986.161886] ? perf_trace_lock_acquire+0xc9/0x700 [ 986.161919] ? perf_trace_lock+0xb5/0x5d0 [ 986.161943] ? __lock_acquire+0xc65/0x1b70 [ 986.161974] ? __pfx_perf_trace_lock+0x10/0x10 [ 986.162003] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 986.162075] ? down_read_nested+0x350/0x470 [ 986.162110] ? __fget_files+0x34/0x3b0 [ 986.162142] ? find_held_lock+0x2b/0x80 [ 986.162181] ? __fget_files+0x203/0x3b0 [ 986.162214] ? __pfx_lo_ioctl+0x10/0x10 [ 986.162246] blkdev_ioctl+0x27c/0x6d0 [ 986.162283] ? __pfx_blkdev_ioctl+0x10/0x10 [ 986.162319] ? selinux_file_ioctl+0xb9/0x280 [ 986.162364] ? __pfx_blkdev_ioctl+0x10/0x10 [ 986.162403] __x64_sys_ioctl+0x18f/0x210 [ 986.162434] do_syscall_64+0xbf/0x390 [ 986.162478] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 986.162504] RIP: 0033:0x7efc343398d7 [ 986.162524] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 986.162548] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 986.162573] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc343398d7 [ 986.162590] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 986.162605] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 986.162620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 986.162635] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 986.162677] [ 986.262150] loop2: detected capacity change from 0 to 4 13:33:13 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x21, @fixed}, 0xe) shutdown(r0, 0x1) 13:33:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x84, @fixed}, 0xe) shutdown(r0, 0x1) 13:33:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540d, &(0x7f0000000000)) 13:33:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5410, &(0x7f0000000000)={0x1000}) 13:33:13 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xc, 0x1, 0x5, 0x40, 0x0, 0x5, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x40, 0x2, @perf_bp={&(0x7f0000000100)}, 0x58000, 0x1ff, 0xd05, 0x9, 0x4, 0x40, 0x1, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x5, 0x40, 0x7f, 0x0, 0x0, 0x800, 0x808, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x10001, 0x1, @perf_bp={&(0x7f0000000040), 0xd}, 0x503, 0x101, 0x4, 0x4, 0x10000, 0x9, 0x81, 0x0, 0x2}, 0x0, 0x1, r0, 0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) 13:33:13 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b65, &(0x7f0000000000)={0x1000}) [ 986.321565] EXT4-fs (loop2): invalid inodes per group: 0 [ 986.321565] 13:33:13 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r1 = openat(r0, &(0x7f00000001c0)='./file0\x00', 0x2002, 0xbf3271af79cc0780) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0xf7, 0x3, 0x9, 0xe1, 0x0, 0x2, 0x80010, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000100), 0x4}, 0x4000, 0x101, 0x7, 0xe, 0x2, 0x800, 0xd441, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xa, r1, 0x1) read(r0, &(0x7f0000000040)=""/102, 0x66) splice(r2, &(0x7f0000000000)=0x7fff, r2, &(0x7f0000000040)=0x3, 0x1, 0x8) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x80200, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/102, 0x66) close_range(r4, r5, 0x0) read(r3, &(0x7f0000000240)=""/157, 0x9d) 13:33:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540e, &(0x7f0000000000)) 13:33:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5412, &(0x7f0000000000)={0x1000}) 13:33:13 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = getpid() r4 = pidfd_open(r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000000000)) r5 = getpid() r6 = pidfd_open(r5, 0x0) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r6, &(0x7f0000000040)={r1, r4, 0x8001}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r7, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0xae, 0xbe, 0x20, 0x7, 0x0, 0x1, 0x1c004, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x6, 0xc86, 0x6, 0x1, 0x4, 0x8, 0x3ff, 0x0, 0x0, 0x0, 0x3}, r2, 0xf, r7, 0x3) r8 = getpid() r9 = pidfd_open(r8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r9, &(0x7f0000000000)) 13:33:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 31) [ 986.620761] loop2: detected capacity change from 0 to 4 [ 986.657894] EXT4-fs (loop2): invalid inodes per group: 0 [ 986.657894] 13:33:24 executing program 5: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f00000014c0)) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001600)=ANY=[@ANYBLOB="3400009e842bfa08475eef5a", @ANYRES16=r7, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32=r8, @ANYBLOB="08002600a809000008009f00050000000800a00062090000"], 0x34}}, 0x0) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r4, &(0x7f0000001480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001440)={&(0x7f0000001640)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="0a00060008021100000100000a000600ffffffffffff00000a000600ffffffffffff00000a00060008021100000100000a000600ffffffffffff00000a00060008021100000000000a0006000802110000010000"], 0x70}, 0x1, 0x0, 0x0, 0x44000}, 0x20048800) read(r4, &(0x7f0000000040)=""/102, 0x66) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x1c, r7, 0x10, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x1f}, @void, @void}}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048010}, 0x20000080) pwritev2(r4, &(0x7f0000000280)=[{&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000040)="d6315cc8b9f7cab119021a99d9b172e07f13982f5a0879cdccd65c202be8bf0ae26782607961bf3cf44d334e7c6e4b263b2d2057eeeed1261bc84a1ba8de696efce62883f9fa49b59f4cf334b87e05dd7476c71e611382d4074c1c234843b5c105753539b95a0abb3766d2b9e6c3b909879a27da210785f5e7", 0x79}, {&(0x7f00000000c0)="ee3b1c1b9594149e1cbcd79a95ea76c8301469512fdd15ba0b4350bb331be97750bb99d0772fc3af488316b408aba7076570b03b9f7dcc8c7c3234b88b66ec0bfde7609b79d4189714485a28a41184155e4d7e06fca65d7729bd00ac172ce7ec759751bfe625bc4a40b0b1b1a8ab1a91b0ab033e7ccef1f8bc647f51b4b10bf5f436294cb28ba7507fac6a7ec62462286c2bd0655b51e1b052502fc4ee9983696be20de720f920506c02b642fffd23076bf9cf783e36e2c4b074a66ef4988aece0b73747245f727fa1c1700682e48ebaa6b484572acd22a95c8e30cfc3c645bb52ff8b2b6e", 0xe5}, {&(0x7f00000001c0)="e370abb280aea38fd4fac057ebc8fb7dcd73add460430cd4ea5a7a3782a7ed44c55c584bf4ade1f9d8495d3e983265a363e787d78435c384fcd6af61e27eb13ee10d818ff25de8071a2db1a37ca923c203196ec0f8f3ced4c72d5ac3634c68f06193d8cb830015a01c6de6ec5bf4cefb8987bc0fd2be582067c70358147637247e79df6f", 0x84}], 0x4, 0x8, 0x3f, 0x10) 13:33:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) 13:33:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 32) 13:33:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5413, &(0x7f0000000000)={0x1000}) 13:33:24 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b72, &(0x7f0000000000)={0x1000}) 13:33:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540f, &(0x7f0000000000)) 13:33:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x5, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc340000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/bluetooth', 0x208881, 0x121) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000080)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$KDDELIO(r2, 0x4b35, 0x1) 13:33:24 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xab}, 0x0, 0x0, 0x0, 0xd, 0x0, 0x2}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f0000000100), 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/2, 0x2}], 0x1, &(0x7f0000000200)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}, 0x21) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000001680)=[{&(0x7f0000000440)=""/255, 0xff}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)}, {&(0x7f0000001640)=""/14, 0xe}], 0x5, &(0x7f0000001700)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf0}, 0x40000000) r6 = syz_open_procfs$namespace(r1, &(0x7f0000001840)='ns/uts\x00') r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r7, &(0x7f0000000040)=""/102, 0x66) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r6, &(0x7f0000001880)={r7, r2}) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f0000001600)) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r8, &(0x7f0000000040)=""/102, 0x66) pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r2, &(0x7f0000000040)={0x2000}) [ 997.738919] FAULT_INJECTION: forcing a failure. [ 997.738919] name failslab, interval 1, probability 0, space 0, times 0 [ 997.740790] CPU: 1 UID: 0 PID: 7878 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 997.740819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 997.740831] Call Trace: [ 997.740839] [ 997.740847] dump_stack_lvl+0xfa/0x120 [ 997.740886] should_fail_ex+0x4d7/0x5e0 [ 997.740914] ? __kernfs_new_node+0xd3/0x870 [ 997.740947] should_failslab+0xc2/0x120 [ 997.740979] kmem_cache_alloc_noprof+0x72/0x680 [ 997.741005] ? perf_trace_lock_acquire+0xc9/0x700 [ 997.741042] ? __kernfs_new_node+0xd3/0x870 [ 997.741073] __kernfs_new_node+0xd3/0x870 [ 997.741112] ? __pfx___kernfs_new_node+0x10/0x10 [ 997.741152] ? lock_acquire+0x15e/0x2f0 [ 997.741177] ? kernfs_root+0x23/0x2a0 [ 997.741209] ? find_held_lock+0x2b/0x80 [ 997.741242] ? kernfs_root+0xee/0x2a0 [ 997.741274] ? lock_release+0xc8/0x290 [ 997.741297] ? lock_is_held_type+0x9e/0x120 [ 997.741336] kernfs_new_node+0x13c/0x1e0 [ 997.741366] __kernfs_create_file+0x55/0x360 [ 997.741400] sysfs_add_file_mode_ns+0x21c/0x440 [ 997.741436] ? __pfx_dev_attr_store+0x10/0x10 [ 997.741469] internal_create_group+0x571/0xeb0 [ 997.741524] ? __pfx_internal_create_group+0x10/0x10 [ 997.741559] ? blk_validate_limits+0xc27/0x15c0 [ 997.741595] ? lock_is_held_type+0x9e/0x120 [ 997.741629] loop_configure+0xc42/0x1590 [ 997.741690] ? __pfx_loop_configure+0x10/0x10 [ 997.741740] ? avc_has_extended_perms+0x107/0xf20 [ 997.741768] ? find_held_lock+0x2b/0x80 [ 997.741801] ? avc_has_extended_perms+0x23b/0xf20 [ 997.741828] ? lock_release+0xc8/0x290 [ 997.741858] lo_ioctl+0x66d/0x1c70 [ 997.741892] ? __pfx_lo_ioctl+0x10/0x10 [ 997.741918] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 997.741947] ? __pfx_perf_trace_lock+0x10/0x10 [ 997.741980] ? lock_acquire+0x15e/0x2f0 [ 997.742004] ? __virt_addr_valid+0x1c6/0x5d0 [ 997.742042] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 997.742068] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 997.742090] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 997.742112] ? lock_release+0xc8/0x290 [ 997.742142] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 997.742212] ? down_read_nested+0x350/0x470 [ 997.742241] ? __fget_files+0x34/0x3b0 [ 997.742268] ? find_held_lock+0x2b/0x80 [ 997.742301] ? __fget_files+0x203/0x3b0 [ 997.742328] ? __pfx_lo_ioctl+0x10/0x10 [ 997.742355] blkdev_ioctl+0x27c/0x6d0 [ 997.742386] ? __pfx_blkdev_ioctl+0x10/0x10 [ 997.742417] ? selinux_file_ioctl+0xb9/0x280 [ 997.742454] ? __pfx_blkdev_ioctl+0x10/0x10 [ 997.742487] __x64_sys_ioctl+0x18f/0x210 [ 997.742514] do_syscall_64+0xbf/0x390 [ 997.742550] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 997.742573] RIP: 0033:0x7efc343398d7 [ 997.742589] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 997.742610] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 997.742630] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc343398d7 [ 997.742645] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 997.742657] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 997.742670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 997.742683] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 997.742718] 13:33:24 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4bfa, &(0x7f0000000000)={0x1000}) 13:33:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5410, &(0x7f0000000000)) 13:33:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) [ 997.889441] loop2: detected capacity change from 0 to 4 13:33:24 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x20000008}) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) [ 997.920662] EXT4-fs (loop2): invalid inodes per group: 0 [ 997.920662] 13:33:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x2}}, 0xe) shutdown(r0, 0x1) 13:33:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5415, &(0x7f0000000000)={0x1000}) 13:33:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 33) 13:33:37 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4bfb, &(0x7f0000000000)={0x1000}) 13:33:37 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5412, &(0x7f0000000000)) 13:33:37 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = getpid() pidfd_open(r3, 0x0) r4 = signalfd(r0, &(0x7f00000000c0)={[0x33]}, 0x8) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x93, 0x1, 0x3, 0x0, 0x1, 0x4080, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10001, 0x4, @perf_config_ext={0x3, 0x3}, 0x8200, 0x1, 0x1, 0xe1462aeaa6ef4b94, 0x2, 0x8, 0x81, 0x0, 0x10002, 0x0, 0x93a}, r3, 0xa, r4, 0x8) r5 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r5, &(0x7f0000000000)) 13:33:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) (fail_nth: 1) 13:33:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000040)) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) [ 1011.000110] FAULT_INJECTION: forcing a failure. [ 1011.000110] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1011.001636] CPU: 1 UID: 0 PID: 7918 Comm: syz-executor.5 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1011.001660] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1011.001671] Call Trace: [ 1011.001677] [ 1011.001684] dump_stack_lvl+0xfa/0x120 [ 1011.001718] should_fail_ex+0x4d7/0x5e0 [ 1011.001741] _copy_from_user+0x30/0xd0 [ 1011.001762] vt_do_kdsk_ioctl+0x84/0x9d0 [ 1011.001790] ? __pfx_vt_do_kdsk_ioctl+0x10/0x10 [ 1011.001814] ? security_capable+0x2f/0x90 [ 1011.001847] vt_ioctl+0x4fb/0x2e60 [ 1011.001876] ? __pfx_vt_ioctl+0x10/0x10 [ 1011.001898] ? lock_acquire+0x15e/0x2f0 [ 1011.001921] ? perf_trace_lock+0xb5/0x5d0 [ 1011.001944] ? find_held_lock+0x2b/0x80 [ 1011.001973] ? get_pid_task+0xfd/0x250 [ 1011.001994] ? perf_trace_lock+0xb5/0x5d0 [ 1011.002019] ? __pfx_perf_trace_lock+0x10/0x10 [ 1011.002039] ? proc_fail_nth_write+0x97/0x220 [ 1011.002065] ? find_held_lock+0x2b/0x80 [ 1011.002092] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1011.002119] ? __pfx_vt_ioctl+0x10/0x10 [ 1011.002145] tty_ioctl+0x78b/0x1810 [ 1011.002171] ? __pfx_tty_ioctl+0x10/0x10 [ 1011.002193] ? ioctl_has_perm.constprop.0.isra.0+0x331/0x4e0 [ 1011.002222] ? __mutex_unlock_slowpath+0x151/0x750 [ 1011.002250] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1011.002281] ? down_read_nested+0x296/0x470 [ 1011.002304] ? __fget_files+0x34/0x3b0 [ 1011.002326] ? find_held_lock+0x2b/0x80 [ 1011.002352] ? __fget_files+0x203/0x3b0 [ 1011.002373] ? lock_release+0xc8/0x290 [ 1011.002402] ? selinux_file_ioctl+0xb9/0x280 [ 1011.002432] ? __pfx_tty_ioctl+0x10/0x10 [ 1011.002457] __x64_sys_ioctl+0x18f/0x210 [ 1011.002485] do_syscall_64+0xbf/0x390 [ 1011.002516] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1011.002535] RIP: 0033:0x7ff69b84bb19 [ 1011.002548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1011.002564] RSP: 002b:00007ff698dc1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1011.002581] RAX: ffffffffffffffda RBX: 00007ff69b95ef60 RCX: 00007ff69b84bb19 [ 1011.002593] RDX: 0000000020000000 RSI: 0000000000004b46 RDI: 0000000000000003 [ 1011.002604] RBP: 00007ff698dc11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1011.002614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1011.002625] R13: 00007ffd315654bf R14: 00007ff698dc1300 R15: 0000000000022000 [ 1011.002653] [ 1011.073366] loop2: detected capacity change from 0 to 4 [ 1011.078029] EXT4-fs (loop2): invalid inodes per group: 0 [ 1011.078029] 13:33:38 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x22}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = getpid() kcmp(r2, r2, 0x3, 0xffffffffffffffff, r1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) epoll_pwait(r1, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0xffffffff, &(0x7f0000000180)={[0xb]}, 0x8) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x88040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000080)) ioctl$HIDIOCGRAWPHYS(0xffffffffffffffff, 0x80404805, &(0x7f00000000c0)) 13:33:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 34) 13:33:38 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5409, &(0x7f0000000000)={0x1000}) 13:33:38 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5413, &(0x7f0000000000)) 13:33:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) (fail_nth: 2) 13:33:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5416, &(0x7f0000000000)={0x1000}) 13:33:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000, 0x8}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000040)={0x3, 0x0, 0x14, 0x16, 0x94, &(0x7f00000003c0)}) [ 1011.251424] FAULT_INJECTION: forcing a failure. [ 1011.251424] name failslab, interval 1, probability 0, space 0, times 0 [ 1011.252649] CPU: 1 UID: 0 PID: 7942 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1011.252672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1011.252683] Call Trace: [ 1011.252690] [ 1011.252697] dump_stack_lvl+0xfa/0x120 [ 1011.252735] should_fail_ex+0x4d7/0x5e0 [ 1011.252757] ? __kernfs_new_node+0xd3/0x870 [ 1011.252787] should_failslab+0xc2/0x120 [ 1011.252817] kmem_cache_alloc_noprof+0x72/0x680 [ 1011.252839] ? perf_trace_lock_acquire+0xc9/0x700 [ 1011.252866] ? __kernfs_new_node+0xd3/0x870 [ 1011.252889] __kernfs_new_node+0xd3/0x870 [ 1011.252917] ? __pfx___kernfs_new_node+0x10/0x10 [ 1011.252945] ? lock_acquire+0x15e/0x2f0 [ 1011.252964] ? kernfs_root+0x23/0x2a0 [ 1011.252987] ? find_held_lock+0x2b/0x80 [ 1011.253010] ? kernfs_root+0xee/0x2a0 [ 1011.253034] ? lock_release+0xc8/0x290 [ 1011.253050] ? lock_is_held_type+0x9e/0x120 [ 1011.253078] kernfs_new_node+0x13c/0x1e0 [ 1011.253100] __kernfs_create_file+0x55/0x360 [ 1011.253125] sysfs_add_file_mode_ns+0x21c/0x440 [ 1011.253151] ? __pfx_dev_attr_store+0x10/0x10 [ 1011.253175] internal_create_group+0x571/0xeb0 [ 1011.253209] ? __pfx_internal_create_group+0x10/0x10 [ 1011.253233] ? blk_validate_limits+0xc27/0x15c0 [ 1011.253259] ? lock_is_held_type+0x9e/0x120 [ 1011.253284] loop_configure+0xc42/0x1590 [ 1011.253331] ? __pfx_loop_configure+0x10/0x10 [ 1011.253366] ? avc_has_extended_perms+0x107/0xf20 [ 1011.253388] ? find_held_lock+0x2b/0x80 [ 1011.253411] ? avc_has_extended_perms+0x23b/0xf20 [ 1011.253430] ? lock_release+0xc8/0x290 [ 1011.253452] lo_ioctl+0x66d/0x1c70 [ 1011.253482] ? __pfx_lo_ioctl+0x10/0x10 [ 1011.253500] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1011.253522] ? __pfx_perf_trace_lock+0x10/0x10 [ 1011.253546] ? lock_acquire+0x15e/0x2f0 [ 1011.253563] ? __virt_addr_valid+0x1c6/0x5d0 [ 1011.253590] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1011.253609] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1011.253625] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1011.253641] ? lock_release+0xc8/0x290 [ 1011.253662] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1011.253713] ? down_read_nested+0x350/0x470 [ 1011.253734] ? __fget_files+0x34/0x3b0 [ 1011.253753] ? find_held_lock+0x2b/0x80 [ 1011.253777] ? __fget_files+0x203/0x3b0 [ 1011.253796] ? __pfx_lo_ioctl+0x10/0x10 [ 1011.253816] blkdev_ioctl+0x27c/0x6d0 [ 1011.253838] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1011.253860] ? selinux_file_ioctl+0xb9/0x280 [ 1011.253888] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1011.253911] __x64_sys_ioctl+0x18f/0x210 [ 1011.253931] do_syscall_64+0xbf/0x390 [ 1011.253958] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1011.253974] RIP: 0033:0x7efc343398d7 [ 1011.253986] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1011.254001] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1011.254016] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc343398d7 [ 1011.254027] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1011.254036] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1011.254045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1011.254054] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1011.254079] [ 1011.356250] FAULT_INJECTION: forcing a failure. [ 1011.356250] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1011.357707] loop2: detected capacity change from 0 to 4 [ 1011.358012] CPU: 0 UID: 0 PID: 7954 Comm: syz-executor.5 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1011.358042] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1011.358054] Call Trace: [ 1011.358061] [ 1011.358070] dump_stack_lvl+0xfa/0x120 [ 1011.358110] should_fail_ex+0x4d7/0x5e0 [ 1011.358139] _copy_to_user+0x32/0xd0 [ 1011.358165] simple_read_from_buffer+0xe0/0x180 [ 1011.358193] proc_fail_nth_read+0x18a/0x240 [ 1011.358227] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1011.358259] ? security_file_permission+0x22/0x90 [ 1011.358288] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1011.358319] vfs_read+0x1eb/0xc70 [ 1011.358356] ? __pfx_vfs_read+0x10/0x10 [ 1011.358386] ? lock_release+0xc8/0x290 [ 1011.358419] ? __fget_files+0x20d/0x3b0 [ 1011.358460] ksys_read+0x121/0x240 [ 1011.358494] ? __pfx_ksys_read+0x10/0x10 [ 1011.358535] do_syscall_64+0xbf/0x390 [ 1011.358572] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1011.358595] RIP: 0033:0x7ff69b7fe69c [ 1011.358612] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1011.358632] RSP: 002b:00007ff698dc1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1011.358654] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff69b7fe69c [ 1011.358668] RDX: 000000000000000f RSI: 00007ff698dc11e0 RDI: 0000000000000004 [ 1011.358681] RBP: 00007ff698dc11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1011.358694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1011.358706] R13: 00007ffd315654bf R14: 00007ff698dc1300 R15: 0000000000022000 [ 1011.358742] [ 1011.417745] EXT4-fs (loop2): invalid inodes per group: 0 [ 1011.417745] 13:33:47 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540b, &(0x7f0000000000)={0x1000}) 13:33:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5418, &(0x7f0000000000)={0x1000}) 13:33:48 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) r2 = perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x80, 0x8, 0x4, 0x7, 0x6a, 0x0, 0xfffffffffffffffc, 0x84200, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0xdd65}, 0xa118, 0x8, 0x4e, 0x5, 0x200, 0x4, 0x9, 0x0, 0x2, 0x0, 0x9}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x4) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) r3 = getpid() epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x20000008}) r4 = pidfd_open(r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)) 13:33:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x3}}, 0xe) shutdown(r0, 0x1) 13:33:48 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/102, 0x66) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) r7 = syz_open_procfs$namespace(0x0, &(0x7f0000001700)='ns/user\x00') r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002740)='/proc/key-users\x00', 0x0, 0x0) r9 = pidfd_getfd(r1, r1, 0x0) io_submit(0x0, 0xa, &(0x7f0000002900)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0xfbc3, r2, &(0x7f0000000100)="55aaaed0efd5ed7cbd058499d5a8f29fd16534d5ca5cd1b9038a06bd9bc163ba5e6407ea252209ff2f206bd8ac2c6bf6cad38c4d01525354af5348b905c958920027f342b0cdf1595ba070f8e7f317f46fdc4f480e9c1a2b24ed648a80c0c5fcee55a2f0eb088fe31ab5e74471a186d2cce6717fe7f0dc21185858ea3fa1cda5b85aed873fe4cb5fae286803e81b443ec94c3486e1a55ac7dd93f9f7498ebaf2cad776a11664c7b0fdfd983a6df1364663e8e48a156d5a36243ec4307dc0be1d9203ec5629ef17adffcfdbb0ecb3ae8a34f124843d708a9d2af219dcedb5df73eeb7c857836e30bf57849ab9cf1dba0932d4d2192799", 0xf6, 0x6, 0x0, 0x3}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x2, r1, &(0x7f00000003c0)="d51c8b249977008a77ee474e9d8178c720cd356411c4a27fdde7cb10258514a1b90fe5a756301823a9f951030c6c687fce463f7f61622561e7fc5bbeb2667f4302c0b63171b37897189e2cd129eaf39ebdf1937a87812bf5c662401dc6e7b2a0b453aaca7ebececf847fb966fb0f7f45776e91688dbbba55233f0c8644421a22b0ca67565c91171f29a1ab52c898db2172ed39d75f759411e17ce2c1c0759ce51489a01f3b94fdde2f723208e36b6fd6353036d628fa3bbcc7065f742dd9fdd3baea360545fad9f21f472661527574410e8f1ba50fd0a524a61946dc3b6032edc6398c191e38012f85aedc6dcb8e978dfe082864596c765fd75ba631e0382848063a9c306a2975e3f94a1cbaf6988459d0de16f3ed9effd0e55a81378981b9c3beed77ae31d955d21c280a55a52e160a38ed5143c315e60700d13ae67105a8062a59f536d50c10f551bcead87cb7ea1919aab25602d6e74e62756fe6d4b3f0b0397e554dd8eb89161be96c3f4ce7538a4de1bfa195514b1bd0d6d30d164e58384b41c72468b4affc06f13065e1e4b2120aa3e15bc638e1602dc5bbd677b6fd65a132b335c6b41785fcea0bc5db755de156b60f72ec22067dc61f4f54203cc45a16d7fddb8f83e8c2fcabd1be22554100bcd62f75cf922f60d3c4a1ed3fe66e6b8b9d490d70e747463a0be1f6da38f86c5bb770d37c071d8c45f20813920a52c80bbec745f75d58cc89c6725431b014d935b9e827655c4efa216ad4b9e4e8b1604685bd89e2a5675754538a408e0d1b7293dca881e006ac6efab64c0464f3d2638636dc1cef48bb0f34e25c4ccb8c101dad9eeb797d2ddd51fcab9278df903fc035a4ce4bcd02605f3caac30c674c7b117e6fe366117b6b66fde7fa91c561890d9a338815d1ae75f41521d9df797ece267f8ac129868e1596f961afe2cc6128b4d2c1d4520e3fd0faff5a96e4c16b54ba5734ad3ab6f1aadee83d08d2ad8e16113401818e31baf18bfd7f864a649f813cc8a73f8a974ad90b02083215003d78f1ca232c8b07e7b158017f176a861a07e159c474a98205f829c21ccda16b771e0df6fbd7ab687ae54cff78faeb7f02e088f84195ef40321920d3e83ba02d2e84cec46cbe2e223f4e6e4148cc262f582abfef612bcd5a87c90e709a30c6a0c0fbe2ac1ff5c6bae135311cd7231793fc81d16bae9b368865a8936bda133c85f4d5165849cf55a3f311d79b1865891063ea109f4c98bceaccd346b9bee14c8e211039fff61d1440674d878e083c9fc0dc6cc1faec774c2bb7b575c650084be42185f98074c1973696836752e3392b99b67b415e8517d628f68d336f6e416b98b21b8e39ad8286264008c6c8547d55ba001964f3f4a316df7dd6c161d08c9c98bdd8cc7d90cba83f4646dffc326e14fab3508295ac7ef3c3e848de1ebc568e208380a9140cfa3a5e9a8bf513cee2a817c95874c4056ec3cd6ff8ab6c4ecc1b27435cf65ff61d257328f515cba5a75df56f2f40a4f3e18ec0519f2232e3350b0d9ec4b55c396e9bb4a2cd041a51910bff992d56991cf372cdd76d7b2425eab621e5c58c9033f49293e1313159de2e45ed99cd0ad0417134b2f2ed334270d24971c1c430955cd67a615224279944ff705aaa93a316a777fd1aecd5473eda0da093933ff2f7d7086694e7c7e958229cd3d8f43f32976cee3ec414e87f12e55c19bcd977b1e52dd0e4d98956cadd337ba8b813c399fd1c13940191a606adc3e642b7430db3977b0a74c45572ebe33baf061b67e457573fba513655dd4041ac143a75226722436afe8d3294e34739b5a118f9753ed8ddc246b02c097973331ca18f372eda8d7645939f7ebffaf52bf29831baa97f259e9f81b46f4c34f71efdbaa89a6d60fa64d17ee97571aaa1a24a4dbb2614801d7ad1e2f1a1accb9021e7f3fd821da7235171c85cedb3246df31f106ab8026ebece252234c5ac02051a947e5c73716792768f6f947300602f7b0f9701a29c81b392c12931022b6094c2ca0aa031558c3fc30b6d31df501df21e61f2a09d1564aba1920d91cb3c7a32c46c5f22c7ad0b977c66c19131d6ec8498776e6c7ca6e916fe7ee9bbb1accf1089bf8009cac94dc28f1b3154fb4e19340ee962a61e230408a00ec7352c7aca383beb879327a06065cb18d7f1e8babc30237bd8aef1f164c6a85b412783c0c852b57a2039ca150377855f486cf135cf42c8b0715b905092cd811a5c731d54815bc5b78f31ee9275fdb66948c1fbb62c312a8d11b55bebf0f6a6e3c542d1bd50c95ef9d86d3fa6bd9429740c418c2ca2df5f04900bc6db926b29bf3596cbe65f91bbc03a38ae15f8ceb4eb4b965dbac2ceaac1f273cba3b20c85581d30e512239312b11ba4a06751deed015dded3d0307ae654d509395fac255cb67e3b084dcb42170918148662a2f4de9525a073fd6ed410f3b14dbb95b7dcd8ed9a73841f092ff46ac1e02e41d77f73d4f94b0dd5d469548830dab35d6c636a07184c40d196570f1c8af6395e16fcdfa8755c1df364235bd8bf5f8766d3f8d1b9579b05d13acf157f94948768a24af4783f1ab0d98aa5863023d94d8eaf019498f449fe973b7c05aef3289f9e042a498b8e21c88f3f649774beab98d2e9cc3d70bb7e16d8f66ddd3ec787d8c30d3460a470f7d7b504897eff11d1e37d7e9b567025384a05a0d5fb0093c73aa16909b1bd5fb355c5db8a8354f1f5e22e3a966d36a0bae292b2e1cb65698de12c9d17dd044192a190b4c5dd5f6c41b82084ccafd0f3fe8a9f605162da515827e083fd9724126bee2dbabe612874d016f420701a01caea4d750288698e4f25be22272e6b48810e74e44e843e8b6c647caff56a409d06fb776d6a96335f2862303f9d306fd838f89c5ec3b5b801bc280b9e09b78fed3a40999826288fbafa870c93fe4f5e924b8872f255d24684ec113b717ea0c8dd33f0c780ea14650639eda29a513f1cc5ecef9817cc49666855124ca3a6a43811c1ba9c93c77b501e08e64cf937b5e51461a438d3091ae8b6edb8783c89b68fa1ccf4b89f08b9039f39dbe6e6f503fb9fdd166d194768866d5c2418cc6feb230e307d07d621a1421385e087572cf000b5f89c700fc3dc6edd1ac478d22244faa2471350f25912beb5cdabe876b5ae40bb117f2b2d7ec055f2e61733b94cadbdccbbde524dbe767e9c6123e60ec2d55c659728a50f43ad4a5b021bc8712ead8789786721977861355a2f0ccbce8ee26c9e7bdacba7e851eb086961c1dc65f9e7ed13414568a0dabfd115438aae92e74cb48dae3e086c361b4007b51dc36fd63cf906cfa87b214a3c08651a5213f0f275c12941c69be93e9c96e1ed4a0ffdbb4634122dc02e6edc65f15e8f7062a0864dad6ddfae00b62253107d904c1ff1096e3cb0677672a21e997d4b75211b867d2ecfbc7cce43458ee92778866a96e7899cefe8dbaea8964c177996fbc21df6b877b12ff90c473bb81600bf1eb371246961bc340f75667ca11b3565f287860782e96b9a1ec8547cd811cf87b02967110c1f65f45c84cb027ac0e9ba20b99cc2fe6a1d8010a32dd742ca7091435120a5300cfc1f7aba57f00f12b4e9e34766890cb1c81c1af8d55d55c1a29ce82c509a3db25f9c06792cf94a2b3c60904245dafd1efa59016eff27020234a22c38ab1eace8179eda234191d6c56b65c6d844f2db1fbe087bb3f70060d5a86de1ca477d318f7cbda0ae30321c9dc4f8122de8406d937f2caf8b83e427dd22196a2d79192f7388ee0777d42946dd4e9789234b6e509bb9c52259cb45e9a3858e86e6a0bb4e5b62c083fdb857ab9423141b21bbd5044f89de81f37af2fcb46d8be39f69c12fc9386ccb8dd4c38bd61ee60b17eb27097dc3616ce27e81655709eede2f113c9623b56053bdd00d7f774bab6e971e6b0dabfc7c6176cb3489e81d0ed2ec2888e50c9b9a88e7c4cf19564f50199a7d11a6e6049890897e345fed2d7861b669ab83aff9dc6c0c52e71b0b8f4e845fe2fedaf9c4dec833f8ec4f3d115494498ff298c9dad8ab4e2d76a69f6357883afa817a12803f43ea67eedb31c7862e3807f27964972529132c5836ba05b438b0582ae9cf0a56884797811d250626baee93e2275aa6c072172c5ea4f8f365a318c06166e401362c0fe40b4586e404b54d9322ab49a2896d9e7b1581f208a0e19ad792311084a3861ee6f7f34175115f2b1f771b3861b69fb0615658ed13fdfc4540ef0fdd37181acc44f7179c54ae332a08f495462e2bd7df859c1ae2a37e10f9b58f6b66df322e96025ff7a7efd116047fa708fc94d82a0a0c184b027f19d0efe3e0ff973c95a7cf227de519156d038bbfe773621a130df705205094532000e7bdeb94ef4917a5c0882af9eb934077ec70ee1e40ed2063933673ad38f7310d310c8d5cb649ea7bd9266f401631a7a8a9e02b8d7731faf99bdb77018f1aabcd95c113a44281b11efe70821ad956eee1894a96dc496c11cfb440e2ad5a85976900c9900021b4a82f723f2e61d89a1f9d4f376d4a7d83dc5a6da0bad0b0ecabdcf9406e4169521e3c659edceb295fea6b28180922adcd2452b7500395b83a873e476b8c0b9a651142229488347b077e2a765f6f6398cc3f8feff58ad46533ded27e9959904f0b5085a2246f40a0702a65b0b504ebce26632fe7edaef31bbb0bf2d1da83f791db15cca5fd09ccb98e62b939b113aa370308227b93ae5404ff2185eeb2c96536c387f68c786a785983314f1224540f4a4f9cd575ce08a1449701d796577e991abc4f972fc8bf5cca46ca1e35b9f19af750d1d240a83fc68f664a4126ba86119210c28378d03a642e087c61364045c29d1eedbe70e68b8da927db4dc387258fa1273444c8a08f1fbfae1ae0f8f26159daf960f75ce8e5cdc42f235a98d0b17fcabcc6c6c15c7bec97371be3e3ecb9d3d88f7b3168bed596f1de989ac45202d82d03556cea396e289cdef576d12992e7b15bd8286e81388128e0ab97ead7c65464cef84e74fa3a11b969e92b65a044a332d879ef00b8a661494151c43c43e6146f71ad8116dee1ef692c1a361149f6bc59487ac62dfc56f7e0b68aa8f929c1f1e2501ed46772aa4aa8b2334b8ee3480f93619a667b28924c1bd8932b04a28fbaef7c7e33d8d5c6af9115ad06573d5f7a2ef3e65aa34713c2dbe417ba0216b889d68df7a1f5bd8e59dbfd6ad6010d2de92ba51eb9899820cfb74e09641e22d4340cb4c3ae469adf7721e99fc8beb1a5667dc28bc87b3b4dc817f0bc4bec864f17a3c574391dcc28fbfe6bd8cc3bc35e28b1c4b662a2385d0b064305b0a5f690fc548aad7aa1ead8aeeddfc021e55b2f4b453ed30aadcce6c8ad3348f53f612ab39b5a8a4a679de2111c487eface582243d7402966ee2ecaebfe6446e26bd3e1aef55115df8edca4d0c033ac7adc456593e294c464d21973992af16b61a29e5491226a8b9d5ab630d1fe5ee10007698c59bd21df0dc9f1460f7e8684b1e5e773981be4e63d8bea6933bd453d44e0088d5de052ac652186c8e16a9c087fe0da35f15543bf8b58ad14cd503e9e516c15c1f08cdeaf7334a3119259fc825989ca7264adb29baa31f4117a53e99d1b8872321f83a98a397c4f3b230e23c1351f3c4bc022cc59ba903b97180fe20ff104de2047687598b5e25d92b86249adfe87c2d5f03973482f32dd9d8b1483a43cf0eab92d1b42481d602d7882d6c92c83a90bead1737a839cab3deca576c81440e7a1bb05adfc51e7324d6ba7403fa217cb80d7ec", 0x1000, 0x1, 0x0, 0x4}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x70d5, 0xffffffffffffffff, &(0x7f0000000280)="05", 0x1, 0x40, 0x0, 0x1, r1}, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x6, 0xfff8, r3, &(0x7f0000000300)="f57c3c3246c65b067ddf3c0ee63b76f9a6ee02c98b69e14072", 0x19, 0xe24, 0x0, 0x2}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x2, 0x1, r4, &(0x7f0000001400)="74ecdaa8481a5528fb7525dc89a1a20d632f877afbac50831c16055f8c4ed04fdc216186ac3658f271c64b667d1396e94734bffda883dbffbe2e24763908d64c8d28a9c7d30aca7ecd195dd0a51490a68269c00d8400d0fb4263f954e28010286044385a1b7e98e1c74eb6b012d904313a918b275cd10c2b4aa2bd292f69313398b5a2fd2ee53b1c3a5497be96ded4e223d872ac87b8d667f222d0ab4a950d3003caab6766c45df4e359f134f37517bfbec63d29b1f4489f763ec83a71beed2a4f9b4a62854e459916bebe16825fc449a60186ef395b51bdcc875a", 0xdb, 0x2}, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x3, 0x920, r2, &(0x7f0000001540)="c6f46531b73f1860aa9fa3e559da74be1759d481f5c8e8485a914071a7bb003dc53312ae15a180ab03a18827dcea036f3e3537ee31b6102633914c9019b288ed280477d9170833fa522f8c61a1ed8fd673f580fcaad611c0aed1ddc184c545164cd4f023efa0da89d0cb6c7ded6cb0781558572f4c8fec6e033c0e4ce7df7959c39dc2a1f37c1646f768321f629a4278f7126bf1ff9871df2b24510b3098379e6c6fc81ded984bd5d63fea6e07b75310de05212eed7ee3437f52028cdfd494ebf622f6633c3379aa04165dc19386fefab227ed76d093c8313e1fb1", 0xdb, 0xffffffff, 0x0, 0x3, r5}, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x6, 0x7, r0, &(0x7f0000001680)="1ea1b133ac58379a03686a92cc4818a8e3feee480f13", 0x16, 0x1, 0x0, 0x1, r6}, &(0x7f0000002780)={0x0, 0x0, 0x0, 0xd, 0x177, r7, &(0x7f0000001740)="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", 0x1000, 0x1000, 0x0, 0x2, r8}, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x3, 0xff, r1, &(0x7f00000027c0)="1e469bd1f2a7bf9cd5853c9c5fdd330b23c55c30be3b6c8140fd99be7b733cffdf2f81b6475f77b039f916f7672a447647fd7c4119e24e93e5b6c4582e", 0x3d, 0x3ff, 0x0, 0x3, r1}, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffffff, &(0x7f0000002840)="a180594e2a3e000cca831755385ac02265cdcd37d2dd3b3144bd3c3c9c761918cf2a4f99c7f6e582663477b9ba74300fb5c995453b94ff9dc445e8d7d0533cd9b6d5835bf3037c0a3e4c60c5347d48a89b294771a04347ef5d5a74d61f28afa6e428e21aec023a074dcd84a17d066c78a9ea170e09728864c426d65e5190aa", 0x7f, 0x1, 0x0, 0x2, r9}]) read(r1, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:33:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) 13:33:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 35) 13:33:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)) [ 1021.039885] loop2: detected capacity change from 0 to 4 [ 1021.065469] EXT4-fs (loop2): invalid inodes per group: 0 [ 1021.065469] 13:33:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x2, &(0x7f0000000000)) 13:33:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5415, &(0x7f0000000000)) 13:33:48 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540c, &(0x7f0000000000)={0x1000}) 13:33:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x34, r1, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x9a8}], @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x962}]]}, 0x34}}, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x34, r5, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x9a8}], @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x962}]]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000280)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r5, 0x100, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0x8, 0x3, r7}, @val={0xc, 0x99, {0xffff, 0x1a}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) sendmsg$NL80211_CMD_ADD_TX_TS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0x0, 0x0, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x4}, @NL80211_ATTR_ADMITTED_TIME={0x6, 0xd4, 0x9}, @NL80211_ATTR_ADMITTED_TIME={0x6, 0xd4, 0x9}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x6}, @NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x20040001}, 0x4000000) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x134, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r8, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:33:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541b, &(0x7f0000000000)={0x1000}) 13:33:48 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)={0x0, 0x0}) pidfd_open(r3, 0x0) r4 = epoll_create1(0x0) r5 = getpid() r6 = getpid() r7 = pidfd_open(r6, 0x0) r8 = syz_open_dev$rtc(&(0x7f0000000080), 0xfff, 0x480001) pidfd_getfd(r2, r8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r7, &(0x7f0000000000)) r9 = getpid() r10 = pidfd_open(r9, 0x0) kcmp$KCMP_EPOLL_TFD(r5, r5, 0x7, r10, &(0x7f0000000040)={r4, r7, 0x8001}) pidfd_open(r5, 0x0) 13:33:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b2f, &(0x7f0000000000)) 13:33:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 36) 13:33:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541d, &(0x7f0000000000)={0x1000}) 13:33:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5416, &(0x7f0000000000)) [ 1021.277351] FAULT_INJECTION: forcing a failure. [ 1021.277351] name failslab, interval 1, probability 0, space 0, times 0 [ 1021.278332] CPU: 1 UID: 0 PID: 8004 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1021.278348] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1021.278355] Call Trace: [ 1021.278360] [ 1021.278365] dump_stack_lvl+0xfa/0x120 [ 1021.278390] should_fail_ex+0x4d7/0x5e0 [ 1021.278407] ? __kernfs_new_node+0xd3/0x870 [ 1021.278425] should_failslab+0xc2/0x120 [ 1021.278444] kmem_cache_alloc_noprof+0x72/0x680 [ 1021.278460] ? perf_trace_lock_acquire+0xc9/0x700 [ 1021.278484] ? __kernfs_new_node+0xd3/0x870 [ 1021.278501] __kernfs_new_node+0xd3/0x870 [ 1021.278522] ? __pfx___kernfs_new_node+0x10/0x10 [ 1021.278544] ? lock_acquire+0x15e/0x2f0 [ 1021.278558] ? kernfs_root+0x23/0x2a0 [ 1021.278575] ? find_held_lock+0x2b/0x80 [ 1021.278593] ? kernfs_root+0xee/0x2a0 [ 1021.278610] ? lock_release+0xc8/0x290 [ 1021.278623] ? lock_is_held_type+0x9e/0x120 [ 1021.278645] kernfs_new_node+0x13c/0x1e0 [ 1021.278661] __kernfs_create_file+0x55/0x360 [ 1021.278680] sysfs_add_file_mode_ns+0x21c/0x440 [ 1021.278700] ? __pfx_dev_attr_store+0x10/0x10 [ 1021.278719] internal_create_group+0x571/0xeb0 [ 1021.278745] ? __pfx_internal_create_group+0x10/0x10 [ 1021.278763] ? blk_validate_limits+0xc27/0x15c0 [ 1021.278783] ? lock_is_held_type+0x9e/0x120 [ 1021.278801] loop_configure+0xc42/0x1590 [ 1021.278835] ? __pfx_loop_configure+0x10/0x10 [ 1021.278862] ? avc_has_extended_perms+0x107/0xf20 [ 1021.278878] ? find_held_lock+0x2b/0x80 [ 1021.278896] ? avc_has_extended_perms+0x23b/0xf20 [ 1021.278910] ? lock_release+0xc8/0x290 [ 1021.278926] lo_ioctl+0x66d/0x1c70 [ 1021.278946] ? __pfx_lo_ioctl+0x10/0x10 [ 1021.278959] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1021.278975] ? __pfx_perf_trace_lock+0x10/0x10 [ 1021.278993] ? lock_acquire+0x15e/0x2f0 [ 1021.279006] ? __virt_addr_valid+0x1c6/0x5d0 [ 1021.279027] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1021.279042] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1021.279054] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1021.279066] ? lock_release+0xc8/0x290 [ 1021.279082] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1021.279121] ? down_read_nested+0x350/0x470 [ 1021.279136] ? __fget_files+0x34/0x3b0 [ 1021.279152] ? find_held_lock+0x2b/0x80 [ 1021.279169] ? __fget_files+0x203/0x3b0 [ 1021.279184] ? __pfx_lo_ioctl+0x10/0x10 [ 1021.279199] blkdev_ioctl+0x27c/0x6d0 [ 1021.279216] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1021.279233] ? selinux_file_ioctl+0xb9/0x280 [ 1021.279254] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1021.279271] __x64_sys_ioctl+0x18f/0x210 [ 1021.279288] do_syscall_64+0xbf/0x390 [ 1021.279313] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1021.279326] RIP: 0033:0x7efc343398d7 [ 1021.279335] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1021.279346] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1021.279358] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc343398d7 [ 1021.279366] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1021.279373] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1021.279380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1021.279387] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1021.279406] [ 1021.354026] loop2: detected capacity change from 0 to 4 13:33:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b30, &(0x7f0000000000)) [ 1021.363735] EXT4-fs (loop2): invalid inodes per group: 0 [ 1021.363735] 13:33:57 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x214, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = getpid() r4 = fsmount(0xffffffffffffffff, 0x1, 0x6) pread64(r4, &(0x7f0000000100), 0x0, 0x81) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000180)=ANY=[@ANYRESDEC=r3, @ANYRES64=0x0, @ANYRESDEC=r0]) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x8, 0x1}}, './file0\x00'}) r5 = getpid() r6 = pidfd_open(r5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r6, &(0x7f0000000000)) r7 = getpid() r8 = pidfd_open(r7, 0x0) kcmp$KCMP_EPOLL_TFD(r3, r3, 0x7, r8, &(0x7f0000000100)={r2, r6, 0x8001}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0xfa, 0xff, 0xfd, 0x3, 0x0, 0x0, 0x8012, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x7fffffff, 0x1f, 0x3, 0x5, 0xe0c, 0x800, 0x0, 0x1, 0x0, 0xe3d}, r3, 0x5, 0xffffffffffffffff, 0x1) r9 = getpid() r10 = pidfd_open(r9, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r10, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000040)=""/102, 0x66) pidfd_getfd(r10, 0xffffffffffffffff, 0x0) 13:33:57 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x5000}) 13:33:57 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540d, &(0x7f0000000000)={0x1000}) 13:33:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x4}}, 0xe) shutdown(r0, 0x1) 13:33:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5418, &(0x7f0000000000)) 13:33:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 37) 13:33:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b31, &(0x7f0000000000)) 13:33:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541e, &(0x7f0000000000)={0x1000}) 13:33:58 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540e, &(0x7f0000000000)={0x1000}) 13:33:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541e, &(0x7f0000000000)={0x1000}) [ 1030.995354] loop2: detected capacity change from 0 to 4 [ 1031.011697] EXT4-fs (loop2): invalid inodes per group: 0 [ 1031.011697] 13:33:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541b, &(0x7f0000000000)) 13:33:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 38) 13:33:58 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000040)=0x44) 13:33:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b32, &(0x7f0000000000)) 13:33:58 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) process_madvise(r2, &(0x7f0000000280)=[{&(0x7f0000000040)="39f045b2da73261713f793bdd7503b34fb41a94920c9b134026a97aa5b06801a4ae8e7c3287a1fd969a5e4bf839b135aeddb7d7e808407d69189e6fb24143effd153dd8165105fa9446818eddd2ddf5b12d3e668e9e23e9e27a355bd46de8c1d2111da585bcbb1d9528e46597ba4cca14343489c7c4ab75926654af4f39dbfb87a187fd38b39168576b296dd2dac50247d8f97b92dd6d783de96c7ab891da3a4a77a7591df95242022a14bedacabc367ee74f3314dcdb4a6", 0xb8}, {&(0x7f00000003c0)="bcfd9d3c1f2f15209ba7596dd5c1705058dd60652e037982929fd2b947cc682474cc01f4077f3a1e9e03798946172382a0d9922e1d5e2d8ebdf88dd772a024b13562c6e446dec28946d01e9d4d627899752f506781781bfb0d8f52f710981c00893661f1a352a99ad120cccbc8cb0250639be3325aee87bcd532dfd153bf4f40cb3ce32ed65b0e7cd4ebc85a632aa34dda28eb7698524fc0473da8bb22b035e3d81ea732ef170ad16b87c8a82f8bb479afc68fdaf1126fbff671074d70be6ebc6c0c60482c7736baf9931c0a29ab66e8528d0fd823b88f7d8955b52593fa37ca8fdd58ad61215e5fa47957ee688c77833fc138eb9605a483ef49f197452f53d0c312c36b7058f3ea05c3305fa388f1c32b722cfc04e92b965312206dfd46791121afcd4cfbb4559480c1c259f8ab77a62f88bf83ae8e3a58db43ed31060bd1c354b766782b2135017f7410fa327f4bb4aec12f3eb60576c0ac8f26f0f6fdb1fcf327778f383b6e4f66aab9adeec0f37b9c9837a6976780c5551d663a404a93cf2256a12686552f53da4dec3e4c8b7a0d75b3a7fda6c7287b9eef51dfeadecdba226105a4af8898029bbb64c0cf1a43f3bb295adc2e30c053f23439fcaa9a235ed4b647aa25d9f933e77091e0b716a22d3f071fba3507f5b43b7d9af39bb392620c67cb0faa779510e399b55e6afb1324a8bcbcb4bf3408c64987b7f6160be235ca1d4e560da8e0fddebafbcbe9d376ac4c67de64aeb3a090674f7a8a8509d3e6b6c931e5771d68ff228d29a5e4afdd563fcefff1c98a4b0ec2569946388e72222f4d2c642a2804cc3871680d53a856bf6fff7bce679f15664f4d29b7d4f9a208b24bfd4f6ecb25116805fdfbb2674e0ad9538da593b2be00ee3964017a57e467489d8c3f25d2861ec8cfa6ac5263cc34a9b585bf84b3e3ed4c67255edf713daf703b97eddb69506e4bbd8d9e41637842e973c8871ccb84a591edb27558eb1bcd291c1afd2fd7cb9274bf0001c7adea86f9b8e8a198ad96cf66c642e5a007566e6a2335f6164484c9a003d8fe1e3f016c8af8dd6461f938dd4e8b54d80ea0dfeb4350eeabcbca06734e112fe681ca8592fb59f83f687d67d76fe6076b895890e2b8adb00adce56d9a238459a335ecf12673c6a1549d069bf255d7b3bd9f1b796c34987c611227eaf0881a4502d3af12b1e46838c26aceacf3152a08ad3da77919d1336beb265b8a1a297faccd40c6bdce7ade4802399a6279248873fa422b7970b9a79f885ae8473fc2b1925dacf1fd14f007213ace602a6262b600adb8242620ec0f2db1e1bab463615d6158de2b25eb71a07a4df3522afdfe72ad849cf35f6b6a610201c38a1aea504a9ba0354c67b76561c3b265af9c20afdafa404c5b7d0cdc9bdf6ef6c700711d52058e701a14cb221220dcbd3fbf23b9f1e2c2dcebf923cd909c8cecf9fbd398b34c23f252939a149d2c1cdc8c1ef8a8870eda80a429594842041e1962b04e4700c7be812c86cfe9d868e612d19aa917be77f457c74efe8d3fd54bcc32167e8b0a361eb8b3402228f04c3c951aed33773f105c0eb6e4ddcf33be456b4bcb8bae10f5f281b354c681af971a9ec7ebf16aa40932d614ac7397abc3bf20a29984074d2d57a91f82b83eb9986813a5f70a955cf8caec1e142d621c6c4b63d22d63d3cac354550fe3962067de9450f62103b08b1436518133d8376ff0e81918639203fb6d60ebeafd39bef70795b4818b0923b44b15f71ab3af55f1a1e984ebce64ef56874ca4188f26c1625a6422dab44dd943b0e4ffadca8507b900fc460ead0be0468f2425542de3979617b857719f8cc14b28a50f0d20bdb62f9a5bf3a71e92b8a889d6876b2b221231e49ccbb032161589e567c5d89af0f21fce7e2a969b3aacf0bc95335833d9f66aa337450410640ae0e245be989e8373169b18069c8e3b45a72692279348e037c77227c2d3223b71b57c7f4a11950d7331ba74ff0c610f75c3483f1ec83a2039390060c5bc94ef5bba0acd73238bb651bb1aab8ffd967f24db5ecb7afecff9959adfd61a0fc6428ddc7801fbce29b4c98b5204efdb114a835d5854fc0f4faeb67f7129837c92881a76f5af8b645ab7e05d80617efbc04dbbb611f807f52fa4b7762c6f4aaf4e301af0033f70cb387b36ef133c1ed63e16aa3a9b8f0f25993b268107f34e700bac7d8eca2c1784bf97449997da42725befd75cec5ef177c4851f7ae1ff0b8fc7ce6cb2e9d531047808bdf1a0da63cc2150691a185681daa3bc0313fc8cbde9ba542b8fb299802d7c016993f6903040d8a9175704d5975232b3209f3377a4249536c35381a73650ed91233be58c8a73226a3b3974fdabd1e17fe5dc17cd4599b579cdedb89f066dc6c85f0e85cd93dc3a1ff991d8c380b345b4a79df7b0c67d310dbf34386c825fdc9f2c53e04a21e69b745382cefab44f94aa6361a6f1ccdbcc7bee8c8f2e69a982e65a7a3f92cb1c0099d648ce9ecf0e1d997079c59307760556a9b381fd161b2291c023c19041771221fbde44594f536159e3148364333fdaefa1be71ed1043fdd0aa166a210cb2030ea7ebeeb61615bd7d8e4c2f4c5cce7b7fa32372e479a5271a77c06365ebd9f4b725f3fe8dedc12b3a6a1855c2b51819fa931afe18034c5fab76030f429a6bf59a9bbbb3d8edae111397804b4e01cfcc99f43ffc14e2b70fe8e2bbfb261fc3b74ddf4c2a09126273ffc307d7b13cbd8a37f421a039d546c1d49fb45b4164e1d462698a83ecf73a46bd320346cad1a44045ffdcd6975b1f36b8cb42b6fe4c54b876b5e5c65f00cb3f13679f7ba31e44210c29cf02190b4a5d08db1ed5a5fd2dea423f37cbaef6a3c9bb205bdb044e5f0b5c54e11641c15bc56e558b2555919df52932087ffcfce615b72ca0fadc9f08ba9ffd73df3f2878072be43519733f458a5d4cf9136efc5ff1b4501c3fed9d9e3a1e859c9b7a1a71cc9edb0fadae471c1c3736b51b7ad9a849df90a430ae14390a0fa729336f58263d61297e557499f32ec4352fa90d3e9d87862d7df75eb3a617732866e7ca5cad4555ad2f5a8ec05dbfa4f6e09eee8ba73d2f63c3ba06b6e69123ffc8225c0e8a6a30f063e23b7d5e0df3510c7722147902c5e79b40192b1e36fff11c240419743baf502993760aa94d589c03b26ee98ed25658feba5a23e18b7cca368dfdb0ed5c634e4c2b051740ae5c459dcdadeaedca43e5f3eb1b3fb3a6b830f7d6d21cbd6b29caa5286fe0897f05ee2da496f4070f6c0c4d3bebd2c2abb55d6a75025bd885420b0deb1bc23b7c0e22cc6e948fbd226b8d8a26e54e0cc079eadc287d177e464c2f8faf0b0a9e381166533b6a88370b3d17a1a2b4244c73c5ebb8b23196fb3a0a0352347225265b05edec8282c2ba7f2076ade288b373e2d083a71cb9503b6d329c979f0310b6b5bf5e161cfee01a2bd4a1dd7bb75c3cdd63c769c41793b3c1b5efc729a6dfaa9eb617fe56101d39c4d549462697539758a10d4f257b6e742579c8f6dddb8421b8d1bba4f411b22a87d3309c779546d743429899189426f976b5115325d91dda2e6ac9f43f9f5f23ec206b25fe68c3a277a27ee6d7a3f3acc169f7403550fc13151042b3e3ce0d627a9e2c106ff91321cf7fe2c5c400b62ac0daafc24b87408b39609a23ca75cd9bebece187b0095fe347a6de24e579dfecc6fe8a62302312384e00b0b68a1e20e03a66a70a94fd6b16fa8cf27d94fdc54da660c83cf734521a76a6ce6bb4af17abb367aafd2ed47ae0c65979cd2cabfbc9e664568f2022cd3dd12eca9615181942f0be4fdc853ca24bd43a5cf990366facb906e34f8bc2d378741318e2e39ebfdc9351591f753ddfe9ba46df4b6daf375b9bed539ebabf8a825b8ed0b75d6318f6fa52f7c05490819c94e137a26f51bff78035028b2a38f2067b3a233687a43c6428da79cc5adbc0affe2e33eb504d2aca54dd844d617cc6d095c9aff509eb1df671a8043859606e3213072c66b7fd424812cbc7c08779a3617a6c839434ad8e888118d8691d6e68cc07039727217b622afe39390d8cc8490e408d44acd2d066a92fabf1767e70d7b9f07ef78689a6db8c09050ccf797587ea1ce9b996138905d4bab2ad0428c9f6fdcfd410436d0f879dedbf749518f10ff6eee925e762bb681d3573ef7c746f2e8eb7bb0af2142c97608e1f4dfee790dada5c3b8e9764196e7be9d0a88603b00f473e5fcbcb14799afae696a48d919b643befa83262ce2f69b77c119b36276e336c53de35ec70ae9f862896ea96c36547375cf2f853a1506beacc22127d428774cf6942a3e84d1a57fd1917a1a2723a865f66162c89fc6e87eea09e23aae5b5131f71a318d470775f42703a9fe214de812704ceac20786927ca1b43673f55ce51e7a412059b295aa7053e936cfd433a499736d0f7d7c7809f4e4a695f37754f6ac1b0be741b4fc67d281227eb26c67a84ecc93332db559609562a36167bc98d97566affae7e97cab4c5af6975f98b6955305e6af8dbb83aaa738acf46259e78d5579dcc0d0b6141a82e1cbfd620a087a77d8e67719510340dd1c7362ae2fb52a7d5664eb82395296714dbb20d9fba56ca86ed0dca7f7a2c254e629093d3610c7b2b9469755e0dc9f9501bd2a1bb58f4ac049b1d754b058af08f44777270d265b11c71b8ec898a11fc24f1af719e401600e8e3812587860df7eb4f723716e0522440a646619a3833c922dcf43cde696f386fad425b7638896d599567faf473967b15083b711c713861a8001ece927748d4cc21c7498d3f65becfdfb760c7d904e947c56abc4725f14bf32cceb7c0b33b20008a60b47d076dbdeed11760448734ad97f3f69ae9d898de1b21f2f69df56def11c2ed94e22c265335de87d39268f4355d33f59119561a64a8adc3dcd3ede88716e4e178e0dbc8ead8da0d355490774198fb86eefa3becc117d7d305a457833dc3be20e5ccac9afe21c789b63569b1539a5afe50388e02c9120dd725acc470026a14b950d81a76e72fc40b4e162a868363bfa60f89779dea7faf92755a00ad400d57ff5050a2f88ce6f59a35754f505e3f48ae4d39012108dd81f300c9b2458d13e8d9a82fcaa2ea4534772a634c9ddc8b4de32fcc25d70f96f07ffdbe59bacdd708008f136cdd232dcb129b111aec183d0fc5af97a89763d8e78159d2015f644f5df1f3b8b5ace0eb9150799c75c75a92a4a33525f567b02d2970f97423095bb166a01713530062fa5f88324c6b46559324c789be3dd32b91c94b8516ccb18b6c2e2acd599af569ae120cfb512358a938d559fcc8a658f0fdffc534fbcf14640acb2e6143904542ec4ded4fcf31eed9a8c36c9e7d966060ae8a3c82429ebee1b20453da0972397654e253fcc4259ac79f3722c4b219c3a503ee9a2bef9dd20312cb313b20be856fb1b5d97471ada782a75c1023e57a0a0d68990239f0cb1ad64b4c132ec766266f6a6e15c761d52e70217d5e38b6f9c4f30617d5338258f9a177a8c32e34561667530e63f0d0230bd73e8ff48a1a24680215dd3db1dc271ad5fbbf344d36a59f82b24a1f983a2525a00a95bf8c2beb7fcfbddfce2ee20bad3608d4ff196dae63c1459424656d0a9e1f64edd8bc894bb4a862182d1baa944012775a6d55c823fca20b4829125e1bb6f950d6eb72f24be5e9967dc9cdaf8d4358339889d604366347c114600abc307cac5801661739db6f6164de448a443d21009b95574fcaa3ea963e355dceea36d31c14a8966c3124d6e22317be", 0x1000}, {&(0x7f0000000100)="acb0ac81b002a07a039b7f1024efbc66df6aff98b92c770d7f9c4685bb7dccf4eb6b40c741ddcf80782bd4f14f38a2a21fb4314a9c4bbdca30397c4194c18bd2d89884dbcd36522ce0f3b71166ec5e09dc5c611db84ca6d1419516e683bdf07d63182f3edf442c12b04ff8af13b3002c85591ea90c6e4e57ad7d03a64be84a7fb33988e33eef56ced6c4043509327b80e83984eb03cb3e45bdf9b1c592e2bf28d77527647deb28666ee27475", 0xac}, {&(0x7f00000001c0)}, {&(0x7f0000000200)="213c0a05fd5f87d4898ca2fc14be80065742c9a3289f2bd07be6f6654376e8d6fcd6ceaecc6be69171320ed42dc58b2d12f818796b3a3e6ac0ec1190f68b92b424631e158d9dcf7b5f8abb749b9bc1404a3f75ef06278e85f4301310494255e485067e79a8f96b019b444520bed0cbe9362dfafdbdbc4f6be933d48baf", 0x7d}], 0x5, 0x4, 0x0) [ 1031.159107] FAULT_INJECTION: forcing a failure. [ 1031.159107] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.160502] CPU: 1 UID: 0 PID: 8054 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1031.160525] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.160535] Call Trace: [ 1031.160542] [ 1031.160549] dump_stack_lvl+0xfa/0x120 [ 1031.160582] should_fail_ex+0x4d7/0x5e0 [ 1031.160604] ? __kernfs_new_node+0xd3/0x870 [ 1031.160630] should_failslab+0xc2/0x120 [ 1031.160656] kmem_cache_alloc_noprof+0x72/0x680 [ 1031.160677] ? perf_trace_lock_acquire+0xc9/0x700 [ 1031.160705] ? __kernfs_new_node+0xd3/0x870 [ 1031.160729] __kernfs_new_node+0xd3/0x870 [ 1031.160759] ? __pfx___kernfs_new_node+0x10/0x10 [ 1031.160789] ? lock_acquire+0x15e/0x2f0 [ 1031.160809] ? kernfs_root+0x23/0x2a0 [ 1031.160833] ? find_held_lock+0x2b/0x80 [ 1031.160858] ? kernfs_root+0xee/0x2a0 [ 1031.160882] ? lock_release+0xc8/0x290 [ 1031.160900] ? lock_is_held_type+0x9e/0x120 [ 1031.160930] kernfs_new_node+0x13c/0x1e0 [ 1031.160955] __kernfs_create_file+0x55/0x360 [ 1031.160981] sysfs_add_file_mode_ns+0x21c/0x440 [ 1031.161009] ? __pfx_dev_attr_store+0x10/0x10 [ 1031.161035] internal_create_group+0x571/0xeb0 [ 1031.161071] ? __pfx_internal_create_group+0x10/0x10 [ 1031.161110] ? blk_validate_limits+0xc27/0x15c0 [ 1031.161143] ? lock_is_held_type+0x9e/0x120 [ 1031.161169] loop_configure+0xc42/0x1590 [ 1031.161216] ? __pfx_loop_configure+0x10/0x10 [ 1031.161254] ? avc_has_extended_perms+0x107/0xf20 [ 1031.161276] ? find_held_lock+0x2b/0x80 [ 1031.161301] ? avc_has_extended_perms+0x23b/0xf20 [ 1031.161321] ? lock_release+0xc8/0x290 [ 1031.161344] lo_ioctl+0x66d/0x1c70 [ 1031.161371] ? __pfx_lo_ioctl+0x10/0x10 [ 1031.161390] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1031.161412] ? __pfx_perf_trace_lock+0x10/0x10 [ 1031.161438] ? lock_acquire+0x15e/0x2f0 [ 1031.161456] ? __virt_addr_valid+0x1c6/0x5d0 [ 1031.161491] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1031.161512] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1031.161528] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1031.161545] ? lock_release+0xc8/0x290 [ 1031.161567] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1031.161621] ? down_read_nested+0x350/0x470 [ 1031.161643] ? __fget_files+0x34/0x3b0 [ 1031.161665] ? find_held_lock+0x2b/0x80 [ 1031.161689] ? __fget_files+0x203/0x3b0 [ 1031.161710] ? __pfx_lo_ioctl+0x10/0x10 [ 1031.161731] blkdev_ioctl+0x27c/0x6d0 [ 1031.161755] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1031.161778] ? selinux_file_ioctl+0xb9/0x280 [ 1031.161807] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1031.161832] __x64_sys_ioctl+0x18f/0x210 [ 1031.161853] do_syscall_64+0xbf/0x390 [ 1031.161882] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1031.161900] RIP: 0033:0x7efc343398d7 [ 1031.161912] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1031.161930] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1031.161949] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc343398d7 [ 1031.161960] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1031.161970] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1031.161980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1031.161990] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1031.162016] [ 1031.202666] loop2: detected capacity change from 0 to 4 [ 1031.205270] EXT4-fs (loop2): invalid inodes per group: 0 [ 1031.205270] 13:34:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x6}}, 0xe) shutdown(r0, 0x1) 13:34:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 39) 13:34:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541d, &(0x7f0000000000)) 13:34:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5421, &(0x7f0000000000)={0x1000}) 13:34:07 executing program 0: sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x9c, 0x0, 0x800, 0x70bd28, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @mon_options=[@NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @device_b}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "d41d4659a0ac7d2aff4f26a57aa8419c97b7931d1ff9753a"}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "65851d17f119f6d8f2e0c83d4caeeb6cb22fbf49343edaf4"}], @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x3) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000040)={0x7ff, 0x5}) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x81, 0x0, 0x80, 0x7f, 0x0, 0xffffffffffffff81, 0x6800, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xdc1, 0x0, @perf_config_ext={0x6, 0x4}, 0x4080, 0x400, 0xc9a, 0x2, 0xffffffff9170d627, 0x2, 0x1ff, 0x0, 0x4669, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r1, 0xa) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:34:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b33, &(0x7f0000000000)) 13:34:07 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000100)={0x4}) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) 13:34:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x540f, &(0x7f0000000000)={0x1000}) [ 1040.134755] FAULT_INJECTION: forcing a failure. [ 1040.134755] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.136827] CPU: 1 UID: 0 PID: 8075 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1040.136862] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1040.136878] Call Trace: [ 1040.136887] [ 1040.136897] dump_stack_lvl+0xfa/0x120 [ 1040.136946] should_fail_ex+0x4d7/0x5e0 [ 1040.136979] ? __kernfs_new_node+0xd3/0x870 [ 1040.137018] should_failslab+0xc2/0x120 13:34:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5410, &(0x7f0000000000)={0x1000}) [ 1040.137057] kmem_cache_alloc_noprof+0x72/0x680 [ 1040.137090] ? perf_trace_lock_acquire+0xc9/0x700 [ 1040.137133] ? __kernfs_new_node+0xd3/0x870 13:34:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5422, &(0x7f0000000000)={0x1000}) [ 1040.137171] __kernfs_new_node+0xd3/0x870 [ 1040.137218] ? __pfx___kernfs_new_node+0x10/0x10 [ 1040.137266] ? lock_acquire+0x15e/0x2f0 [ 1040.137297] ? kernfs_root+0x23/0x2a0 [ 1040.137336] ? find_held_lock+0x2b/0x80 [ 1040.137375] ? kernfs_root+0xee/0x2a0 [ 1040.137414] ? lock_release+0xc8/0x290 [ 1040.137441] ? lock_is_held_type+0x9e/0x120 [ 1040.137496] kernfs_new_node+0x13c/0x1e0 [ 1040.137532] __kernfs_create_file+0x55/0x360 [ 1040.137573] sysfs_add_file_mode_ns+0x21c/0x440 [ 1040.137617] ? __pfx_dev_attr_store+0x10/0x10 [ 1040.137656] internal_create_group+0x571/0xeb0 [ 1040.137713] ? __pfx_internal_create_group+0x10/0x10 [ 1040.137755] ? blk_validate_limits+0xc27/0x15c0 [ 1040.137797] ? lock_is_held_type+0x9e/0x120 [ 1040.137839] loop_configure+0xc42/0x1590 [ 1040.137912] ? __pfx_loop_configure+0x10/0x10 [ 1040.137973] ? avc_has_extended_perms+0x107/0xf20 [ 1040.138007] ? find_held_lock+0x2b/0x80 [ 1040.138046] ? avc_has_extended_perms+0x23b/0xf20 [ 1040.138078] ? lock_release+0xc8/0x290 [ 1040.138115] lo_ioctl+0x66d/0x1c70 [ 1040.138157] ? __pfx_lo_ioctl+0x10/0x10 [ 1040.138188] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1040.138223] ? __pfx_perf_trace_lock+0x10/0x10 [ 1040.138263] ? lock_acquire+0x15e/0x2f0 [ 1040.138292] ? __virt_addr_valid+0x1c6/0x5d0 [ 1040.138336] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1040.138368] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1040.138395] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1040.138422] ? lock_release+0xc8/0x290 [ 1040.138457] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1040.138543] ? down_read_nested+0x350/0x470 [ 1040.138578] ? __fget_files+0x34/0x3b0 [ 1040.138610] ? find_held_lock+0x2b/0x80 [ 1040.138649] ? __fget_files+0x203/0x3b0 [ 1040.138682] ? __pfx_lo_ioctl+0x10/0x10 [ 1040.138715] blkdev_ioctl+0x27c/0x6d0 [ 1040.138751] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1040.138788] ? selinux_file_ioctl+0xb9/0x280 [ 1040.138834] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1040.138873] __x64_sys_ioctl+0x18f/0x210 [ 1040.138905] do_syscall_64+0xbf/0x390 [ 1040.138949] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1040.138976] RIP: 0033:0x7efc343398d7 [ 1040.138996] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1040.139020] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1040.139045] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc343398d7 [ 1040.139062] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1040.139078] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1040.139093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1040.139108] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1040.139151] 13:34:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000040)=""/29) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000080)) 13:34:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b34, &(0x7f0000000000)) 13:34:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541e, &(0x7f0000000000)) [ 1040.240967] loop2: detected capacity change from 0 to 4 13:34:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5412, &(0x7f0000000000)={0x1000}) [ 1040.276132] EXT4-fs (loop2): invalid inodes per group: 0 [ 1040.276132] 13:34:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5423, &(0x7f0000000000)={0x1000}) 13:34:16 executing program 6: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0xc, 0x10000) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0x0, r0, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f00000000c0)) 13:34:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) 13:34:16 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5413, &(0x7f0000000000)={0x1000}) 13:34:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b35, &(0x7f0000000000)) 13:34:16 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1003, 0x2}) 13:34:16 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541e, &(0x7f0000000000)) 13:34:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 40) [ 1049.766964] loop2: detected capacity change from 0 to 4 [ 1049.772590] FAULT_INJECTION: forcing a failure. [ 1049.772590] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.774532] CPU: 1 UID: 0 PID: 8118 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1049.774563] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1049.774576] Call Trace: [ 1049.774584] [ 1049.774593] dump_stack_lvl+0xfa/0x120 [ 1049.774636] should_fail_ex+0x4d7/0x5e0 [ 1049.774666] should_failslab+0xc2/0x120 [ 1049.774701] __kmalloc_cache_noprof+0x73/0x6a0 [ 1049.774726] ? lock_release+0xc8/0x290 [ 1049.774755] ? kobject_uevent_env+0x22e/0xf90 [ 1049.774793] ? kobject_uevent_env+0x22e/0xf90 [ 1049.774822] kobject_uevent_env+0x22e/0xf90 [ 1049.774857] ? lock_is_held_type+0x9e/0x120 [ 1049.774897] loop_configure+0xe2d/0x1590 [ 1049.774963] ? __pfx_loop_configure+0x10/0x10 [ 1049.775017] ? avc_has_extended_perms+0x107/0xf20 [ 1049.775047] ? find_held_lock+0x2b/0x80 [ 1049.775084] ? avc_has_extended_perms+0x23b/0xf20 [ 1049.775113] ? lock_release+0xc8/0x290 [ 1049.775146] lo_ioctl+0x66d/0x1c70 [ 1049.775183] ? __pfx_lo_ioctl+0x10/0x10 [ 1049.775211] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1049.775243] ? __pfx_perf_trace_lock+0x10/0x10 [ 1049.775280] ? lock_acquire+0x15e/0x2f0 [ 1049.775306] ? __virt_addr_valid+0x1c6/0x5d0 [ 1049.775346] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1049.775374] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1049.775398] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1049.775422] ? lock_release+0xc8/0x290 [ 1049.775454] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1049.775538] ? down_read_nested+0x350/0x470 [ 1049.775570] ? __fget_files+0x34/0x3b0 [ 1049.775598] ? find_held_lock+0x2b/0x80 [ 1049.775633] ? __fget_files+0x203/0x3b0 [ 1049.775663] ? __pfx_lo_ioctl+0x10/0x10 [ 1049.775692] blkdev_ioctl+0x27c/0x6d0 [ 1049.775725] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1049.775758] ? selinux_file_ioctl+0xb9/0x280 [ 1049.775798] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1049.775833] __x64_sys_ioctl+0x18f/0x210 [ 1049.775862] do_syscall_64+0xbf/0x390 [ 1049.775901] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1049.775924] RIP: 0033:0x7efc343398d7 [ 1049.775943] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1049.775964] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1049.775987] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc343398d7 [ 1049.776002] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1049.776016] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1049.776030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1049.776056] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1049.776094] 13:34:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b36, &(0x7f0000000000)) 13:34:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5424, &(0x7f0000000000)={0x1000}) [ 1049.849763] EXT4-fs (loop2): invalid inodes per group: 0 [ 1049.849763] 13:34:16 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)={0x1000}) 13:34:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b37, &(0x7f0000000000)) 13:34:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5425, &(0x7f0000000000)={0x1000}) 13:34:16 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5421, &(0x7f0000000000)) 13:34:16 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x14000, 0x2) r2 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="e4cb6c61e4a92a39b08432a09038801576c31a23f88bd98f4c1b", 0x1a, 0x68c6}, {&(0x7f0000000140)="a041cb8d427d33d0d18993a6a7ce265da9251a9aeb17e476a221321ad9b782b3734818f078e29174673072ffd9b4fe2942cafe8027ce176c1ab24473b65d0399492c4983c7775522e1d0d873505b3df81656bcef33ef6b140162f92e7d1f3e2e8cb7ddb986c0396584b2cbccb5555e201e084bb405ddb65b4f62272a9dd4d930bda4dfc00b97c16f9ec5a85ac951d7264fba19c76822beae9bb109bb592094101cf1449a24ce1def4926f8bd44461ba9c9ea967209aa24db0fbe1cb7384c8cf88187407b2c249d8fdb1a7d0c59da82fae33b663a52cac965beb5972b59c35cd679975171b0fae62a", 0xe8, 0x4}], 0x10000, &(0x7f00000003c0)={[{@journal_async_commit}, {@minixdf}, {@usrquota}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@grpid}, {@nodelalloc}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7fff}}, {@errors_continue}, {@data_ordered}], [{@smackfsfloor}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@dont_hash}]}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000280)={0x40002001}) r3 = getpid() r4 = pidfd_open(r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)) [ 1050.014081] loop6: detected capacity change from 0 to 104 [ 1050.020152] journal_path: Non-blockdev passed as './file0' [ 1050.021108] EXT4-fs: error: could not find journal device path [ 1050.036398] loop6: detected capacity change from 0 to 104 [ 1050.058257] journal_path: Non-blockdev passed as './file0' [ 1050.059384] EXT4-fs: error: could not find journal device path [ 1053.342463] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1053.345911] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1053.347965] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1053.351842] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1053.353982] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 1055.380805] Bluetooth: hci1: command tx timeout [ 1057.429626] Bluetooth: hci1: command tx timeout [ 1059.478144] Bluetooth: hci1: command tx timeout [ 1061.524589] Bluetooth: hci1: command tx timeout [ 1070.047681] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1070.048764] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1070.090275] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1070.091367] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 13:34:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:34:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 41) 13:34:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed, 0x2}, 0xe) shutdown(r0, 0x1) 13:34:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [], {}, [{0x8, 0x0, r1}]}, 0x2c, 0x0) r2 = getuid() lstat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x400, 0x2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = epoll_create1(0x0) r6 = getpid() r7 = getpid() r8 = pidfd_open(r7, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r8, &(0x7f0000000000)) r9 = getpid() r10 = pidfd_open(r9, 0x0) kcmp$KCMP_EPOLL_TFD(r6, r6, 0x7, r10, &(0x7f0000000040)={r5, r8, 0x8001}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000b00)=""/115, 0x73}, {&(0x7f0000000580)=""/270, 0x10e}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/202, 0xca}, {&(0x7f0000000880)=""/129, 0x81}, {&(0x7f0000000940)=""/139, 0x8b}, {&(0x7f0000000a00)=""/202, 0xca}], 0x7, &(0x7f0000000b80)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x2001) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfb, 0x4}, 0xc, &(0x7f0000000240)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x110}], 0x1, &(0x7f0000000fc0)=ANY=[@ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r2, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x128, 0x20044000}, 0x2400c010) r11 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}, 0x1400, 0x3e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r11, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$TIOCSTI(r11, 0x5412, &(0x7f0000000080)=0x7) 13:34:48 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x40, 0x8, 0x1f, 0x7f, 0x0, 0x2, 0x404, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000040)}, 0x8080, 0x6af, 0xf42d, 0x7, 0x6, 0xfffff001, 0x80, 0x0, 0x2, 0x0, 0x10001}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x7) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:34:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5422, &(0x7f0000000000)) 13:34:48 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5415, &(0x7f0000000000)={0x1000}) 13:34:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5427, &(0x7f0000000000)={0x1000}) [ 1081.523389] loop2: detected capacity change from 0 to 4 [ 1081.547246] EXT4-fs (loop2): invalid inodes per group: 0 [ 1081.547246] 13:34:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5423, &(0x7f0000000000)) 13:34:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed, 0x3}, 0xe) shutdown(r0, 0x1) 13:34:48 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5416, &(0x7f0000000000)={0x1000}) 13:34:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 42) 13:34:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b3b, &(0x7f0000000000)) 13:34:48 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:34:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5428, &(0x7f0000000000)={0x1000}) [ 1081.722163] loop2: detected capacity change from 0 to 4 [ 1081.732614] FAULT_INJECTION: forcing a failure. [ 1081.732614] name failslab, interval 1, probability 0, space 0, times 0 [ 1081.734584] CPU: 0 UID: 0 PID: 8639 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1081.734613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1081.734626] Call Trace: [ 1081.734633] [ 1081.734642] dump_stack_lvl+0xfa/0x120 [ 1081.734682] should_fail_ex+0x4d7/0x5e0 [ 1081.734709] should_failslab+0xc2/0x120 [ 1081.734742] kmem_cache_alloc_node_noprof+0x79/0x6a0 [ 1081.734769] ? perf_trace_lock+0xb5/0x5d0 [ 1081.734795] ? __alloc_skb+0x2ab/0x370 [ 1081.734833] ? __alloc_skb+0x2ab/0x370 [ 1081.734860] __alloc_skb+0x2ab/0x370 [ 1081.734890] ? __pfx___alloc_skb+0x10/0x10 [ 1081.734918] ? lock_acquire+0x15e/0x2f0 [ 1081.734943] ? netlink_has_listeners+0x7f/0x430 [ 1081.734980] ? netlink_has_listeners+0x20d/0x430 [ 1081.735011] ? lock_release+0xc8/0x290 [ 1081.735040] alloc_uevent_skb+0x7b/0x210 [ 1081.735071] kobject_uevent_env+0xa8c/0xf90 [ 1081.735102] ? lock_is_held_type+0x9e/0x120 [ 1081.735137] loop_configure+0xe2d/0x1590 [ 1081.735196] ? __pfx_loop_configure+0x10/0x10 [ 1081.735242] ? avc_has_extended_perms+0x107/0xf20 [ 1081.735271] ? find_held_lock+0x2b/0x80 [ 1081.735303] ? avc_has_extended_perms+0x23b/0xf20 [ 1081.735329] ? lock_release+0xc8/0x290 [ 1081.735358] lo_ioctl+0x66d/0x1c70 [ 1081.735392] ? __pfx_lo_ioctl+0x10/0x10 [ 1081.735417] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1081.735446] ? __pfx_perf_trace_lock+0x10/0x10 [ 1081.735484] ? lock_acquire+0x15e/0x2f0 [ 1081.735509] ? __virt_addr_valid+0x1c6/0x5d0 [ 1081.735545] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1081.735571] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1081.735593] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1081.735615] ? lock_release+0xc8/0x290 [ 1081.735643] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1081.735708] ? down_read_nested+0x350/0x470 [ 1081.735737] ? __fget_files+0x34/0x3b0 [ 1081.735764] ? find_held_lock+0x2b/0x80 [ 1081.735796] ? __fget_files+0x203/0x3b0 [ 1081.735823] ? __pfx_lo_ioctl+0x10/0x10 [ 1081.735850] blkdev_ioctl+0x27c/0x6d0 13:34:48 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) [ 1081.735881] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1081.735911] ? selinux_file_ioctl+0xb9/0x280 [ 1081.735948] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1081.735980] __x64_sys_ioctl+0x18f/0x210 [ 1081.736006] do_syscall_64+0xbf/0x390 [ 1081.736042] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1081.736064] RIP: 0033:0x7efc343398d7 [ 1081.736081] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1081.736102] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1081.736123] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc343398d7 [ 1081.736137] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1081.736150] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1081.736163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1081.736176] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1081.736208] 13:34:48 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5418, &(0x7f0000000000)={0x1000}) 13:34:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed, 0x4}, 0xe) shutdown(r0, 0x1) 13:34:48 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = fsmount(0xffffffffffffffff, 0x1, 0x81) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x8, 0x7, 0x11, 0x0, 0x800, 0x20144, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2f, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x10420, 0x5, 0x400, 0x3, 0x3, 0x0, 0x541, 0x0, 0x10001, 0x0, 0x1}, r1, 0x1, r2, 0x8) r3 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r4, &(0x7f0000000040)={0x30000008}) [ 1081.914928] EXT4-fs (loop2): invalid inodes per group: 0 [ 1081.914928] 13:34:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b3c, &(0x7f0000000000)) 13:34:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5424, &(0x7f0000000000)) 13:34:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed, 0x6}, 0xe) shutdown(r0, 0x1) 13:34:58 executing program 6: r0 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xfb, 0x2, 0x2, 0x3, 0x0, 0xc4f, 0x20000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x8, 0x7e}, 0xc581, 0x3ff, 0x775bb5ca, 0x9, 0xff, 0x4, 0x800, 0x0, 0x2303357, 0x0, 0x100000001}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2820}, 0x0, 0x0, r0, 0x0) r2 = epoll_create1(0x0) r3 = getpid() write(r2, &(0x7f00000001c0)="ae66a4ed7c485d5e7c1568d3fac4e59a244217143da60805630790be6b49bccb29521bab2503b20dce7ea382b2c99b790d0777d2b181a5b26928ae7d597049d1fce4b1c649c5e1cb1c060f13f99d9d18b40cd0ee746d7ca2a5a08bbc6ea1c1a8436c592e6ecbcc68d43488d8d3913cef3ba2758ffe86c8839d02f09f8dfbd5f94a7b44f0c19637231de888c71e8f37c749f943d253f649bc711703f9c8f711eef45b3fc3b4b16c6cea4ce0c0db948629a5b3e673665cac9fc0939b93291375220bb3b9277b35a6194a6bb9728b2cc901c877451fb6708ae199274a6ff9907c", 0xdf) r4 = pidfd_open(r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000000000)) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/partitions\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2008, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname}, {@uname={'uname', 0x3d, '+('}}, {@privport}, {@afid={'afid', 0x3d, 0xfffffffffffffffa}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) 13:34:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 43) 13:34:58 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) r2 = mq_open(&(0x7f00000004c0)='-\x00', 0x40, 0x10, &(0x7f0000000500)={0x5, 0x5b, 0x7, 0x181}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000580)={0x2, {0x2, 0x2f0, 0x1, 0x1000, 0x7f, 0x3}}) read(r3, &(0x7f0000000040)=""/102, 0x66) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000540)=0x2) close(r2) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000040)="e0153fe26b5ccebc681e8a4fea0ffdd62b927f78c109a77273e7e1d46d8a0799b596829acd2b82f9e5cafd6c9cb9dd9e5c2de09cbe8f0c094969ca74c6f7c10f72286b45e3ebf0fb3a71e2ff17882324d4533624c3b010d7e5ebb7e802d70100eb20429ceedb9c0ef35a8b055beffea61eb3437fb522a2a3cdc0cc40daa82b98ac8f2552d016ce0aeda8a32b6c4e4c070a0af60d2bec1b546e29f66284a0af865554ba5f243a67bf41dc4081de03", 0xae}, {&(0x7f0000000100)="22dbbfc532eead48ef7fc76a47ebb72f3b58e6", 0x13}, {&(0x7f0000000140)="298e89ebf088c9bc3b20affd25c8592cf144439ab7e83e7013c847524809833df044bf44109152ab7769326f4fa7104c97731c459d8e858e7cd708664cf9c40039814b3194b454e68706a8984975011282805e41587bc739d27791066f89bf1894df1a39af596f28bf0efe57e7346161797b44f3a4bc3da8729681f17c43e3cd7c69ace092cd4994a8101a67f2fa590ec92c137bf0aff48e9b0ee321d171d9cbec06ed27a9142c83788c8c17646222362ca313e5b6b5abd67aeff14e60337165ae12d539eaeddd9c2a3809d365809a6c148ef25f009017", 0xd7}, {&(0x7f0000000240)="cb94bdbfa321d6e6ba0cbc09a472320ff9d6c46634859a6b95fabe64b433bbaa1e971e4bd06f6f32b4573115f9e2002d800f4013b24064d4a573ad719c1b34377ac1dfc1d04f8d1e8ea16d8bf72d1ed11ff283060a14a2fbe0033ae2aedde0a281504fa43b4f314da8b5347ae5c71e02c8d863ebf81fa30f13", 0x79}, {&(0x7f00000003c0)="d12c56c7dcc98655f408ac62e17dd5e90ccbfd2c91016dbf147cd496be2db949cb64f0a514824b3534aaa47218f2aba5a096f6f3d26c70d88c0bcd3e8ce647eb1cf775bd50fcd34ec81677e8b6626500adcaba2e8d5ce3da194c3ed3e7c195331bc5380f0e26e490e41c1bf6a0808270934932a8cf8d0cef3f7aae18dd4a00e2afed0f52a44eb6517095a78571f17788b43c51f9b0ef", 0x96}], 0x5) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000480)) 13:34:58 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541b, &(0x7f0000000000)={0x1000}) 13:34:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5429, &(0x7f0000000000)={0x1000}) [ 1091.551791] loop2: detected capacity change from 0 to 4 [ 1091.561778] EXT4-fs (loop2): invalid inodes per group: 0 [ 1091.561778] 13:34:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b3d, &(0x7f0000000000)) 13:34:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5437, &(0x7f0000000000)={0x1000}) 13:34:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 44) 13:34:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b44, &(0x7f0000000000)) 13:34:58 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x9e, 0x7, 0x99, 0x81, 0x0, 0xf6, 0x40580, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xafcdf2d, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x14000, 0x4, 0x2ce8, 0x5, 0x1, 0x3ff, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffff7f}, 0x0, 0xc, 0xffffffffffffffff, 0x8) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) 13:34:58 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541d, &(0x7f0000000000)={0x1000}) 13:34:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5425, &(0x7f0000000000)) [ 1091.703752] loop2: detected capacity change from 0 to 4 [ 1091.716345] EXT4-fs (loop2): invalid inodes per group: 0 [ 1091.716345] 13:35:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5441, &(0x7f0000000000)={0x1000}) 13:35:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5427, &(0x7f0000000000)) 13:35:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541e, &(0x7f0000000000)={0x1000}) 13:35:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 45) 13:35:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed, 0x8}, 0xe) shutdown(r0, 0x1) 13:35:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)) 13:35:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x80, 0x0, 0x0, 0x2000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffc, 0x8, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) mmap(&(0x7f0000fef000/0xf000)=nil, 0xf000, 0x1000008, 0x81830, r1, 0x61c10000) 13:35:07 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7a}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)={0x40000000}) r3 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) [ 1100.719903] loop2: detected capacity change from 0 to 4 13:35:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x3, 0x39, 0x7, 0x0, 0xffffffff, 0x24283, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x184, 0x4000000000000000, 0x20, 0x0, 0x3, 0x6, 0x3, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x80, 0xff, 0xab, 0x0, 0x0, 0x6, 0x20280, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6ba, 0x1, @perf_config_ext={0x200, 0x1ff}, 0x2082, 0x5, 0xffffffff, 0x3, 0x10001, 0x3, 0xffff, 0x0, 0xfffffff8, 0x0, 0x5}, 0xffffffffffffffff, 0xf, r1, 0x3) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) sendfile(r0, r2, &(0x7f0000000180)=0x8, 0x4) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:35:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5428, &(0x7f0000000000)) [ 1100.733273] EXT4-fs (loop2): invalid inodes per group: 0 [ 1100.733273] 13:35:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 46) 13:35:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5450, &(0x7f0000000000)={0x1000}) 13:35:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5429, &(0x7f0000000000)) 13:35:07 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000040)=0x311) r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)) 13:35:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x4000, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:35:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b47, &(0x7f0000000000)) 13:35:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed, 0x300}, 0xe) shutdown(r0, 0x1) 13:35:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x541e, &(0x7f0000000000)={0x1000}) [ 1100.867374] loop2: detected capacity change from 0 to 4 [ 1100.873676] FAULT_INJECTION: forcing a failure. [ 1100.873676] name failslab, interval 1, probability 0, space 0, times 0 [ 1100.874462] CPU: 1 UID: 0 PID: 8750 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1100.874482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1100.874490] Call Trace: [ 1100.874494] [ 1100.874499] dump_stack_lvl+0xfa/0x120 [ 1100.874527] should_fail_ex+0x4d7/0x5e0 [ 1100.874543] ? skb_clone+0x191/0x400 [ 1100.874564] should_failslab+0xc2/0x120 [ 1100.874582] kmem_cache_alloc_noprof+0x72/0x680 [ 1100.874595] ? netlink_broadcast_filtered+0xe6/0xe90 [ 1100.874619] ? skb_clone+0x191/0x400 [ 1100.874635] skb_clone+0x191/0x400 [ 1100.874654] netlink_broadcast_filtered+0xab1/0xe90 [ 1100.874680] ? __pfx_netlink_broadcast_filtered+0x10/0x10 [ 1100.874699] ? skb_put+0x138/0x1b0 [ 1100.874715] netlink_broadcast+0x39/0x50 [ 1100.874734] kobject_uevent_env+0xa58/0xf90 [ 1100.874751] ? lock_is_held_type+0x9e/0x120 [ 1100.874771] loop_configure+0xe2d/0x1590 [ 1100.874802] ? __pfx_loop_configure+0x10/0x10 [ 1100.874827] ? avc_has_extended_perms+0x107/0xf20 [ 1100.874844] ? find_held_lock+0x2b/0x80 [ 1100.874863] ? avc_has_extended_perms+0x23b/0xf20 [ 1100.874877] ? lock_release+0xc8/0x290 [ 1100.874893] lo_ioctl+0x66d/0x1c70 [ 1100.874911] ? __pfx_lo_ioctl+0x10/0x10 [ 1100.874925] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1100.874940] ? __pfx_perf_trace_lock+0x10/0x10 [ 1100.874958] ? lock_acquire+0x15e/0x2f0 [ 1100.874971] ? __virt_addr_valid+0x1c6/0x5d0 [ 1100.874991] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1100.875006] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1100.875018] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1100.875030] ? lock_release+0xc8/0x290 [ 1100.875045] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1100.875081] ? down_read_nested+0x350/0x470 [ 1100.875096] ? __fget_files+0x34/0x3b0 [ 1100.875112] ? find_held_lock+0x2b/0x80 [ 1100.875129] ? __fget_files+0x203/0x3b0 [ 1100.875144] ? __pfx_lo_ioctl+0x10/0x10 [ 1100.875158] blkdev_ioctl+0x27c/0x6d0 [ 1100.875176] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1100.875192] ? selinux_file_ioctl+0xb9/0x280 [ 1100.875213] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1100.875230] __x64_sys_ioctl+0x18f/0x210 [ 1100.875244] do_syscall_64+0xbf/0x390 [ 1100.875264] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1100.875277] RIP: 0033:0x7efc343398d7 [ 1100.875286] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1100.875297] RSP: 002b:00007efc318aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1100.875309] RAX: ffffffffffffffda RBX: 00007efc34383970 RCX: 00007efc343398d7 [ 1100.875317] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1100.875324] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1100.875331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1100.875338] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 1100.875355] 13:35:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5437, &(0x7f0000000000)) [ 1100.956161] EXT4-fs (loop2): invalid inodes per group: 0 [ 1100.956161] 13:35:08 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed, 0x600}, 0xe) shutdown(r0, 0x1) 13:35:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5441, &(0x7f0000000000)) 13:35:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 47) 13:35:18 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5450, &(0x7f0000000000)) 13:35:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5451, &(0x7f0000000000)={0x1000}) 13:35:18 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x4) r5 = epoll_create(0x4b24) read(r5, &(0x7f00000003c0)=""/4096, 0x1000) read(r4, &(0x7f0000000040)=""/102, 0x66) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r4, &(0x7f0000000140)={0xa0000000}) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f0000000040)) 13:35:18 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b48, &(0x7f0000000000)) 13:35:18 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)=0x4) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f00000001c0)={0x0, 0x20, '\x00', 0x1, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc02d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000000c0)) 13:35:18 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5421, &(0x7f0000000000)={0x1000}) 13:35:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) [ 1111.620290] loop2: detected capacity change from 0 to 4 [ 1111.654564] EXT4-fs (loop2): invalid inodes per group: 0 [ 1111.654564] 13:35:18 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5422, &(0x7f0000000000)={0x1000}) 13:35:18 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b49, &(0x7f0000000000)) 13:35:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 48) 13:35:18 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5451, &(0x7f0000000000)) 13:35:18 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101240, 0x0) process_madvise(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)="54591b97784fb4722671b08690a9e562030b08b56e47b95e22607b552b19435727e0d309a4c94f635b2ec0e7f5c2d69030ee414b9802acb0a5cf0546b8ff79f862bf143cc3b673e41a72afbfaaf396ad612e204110d66cb4cf295c0128628a3c817fe5382a392d235de32565e9177b3b5db72eb1e89ad7a47eb83a1fe97618115c2f4ab7ccc20336cbdbee8374148ee06f131d96ae7047c1d33015c9bd24e0080bffc6b26a24f6a81801f76cb0801a066dc31eccb2b1a2e0775a25ac9bce3e459981e88cab4723e718e038a7abd5", 0xce}, {&(0x7f0000000180)="1159c44d697a53931efae1e67717c311d08b271be10cd278defc54428630c586c69a80364ac8ca65ed8ccac3a73e35a7c2c23d9fbc3ac9fd98dd8558895220e87ed9819ae482f29e9c55cf559ad271c281eb6bceb164a71bbdb245941847a419139327fed73bc483d2201b0e253abc4428bf08", 0x73}, {&(0x7f0000000200)="a7c27326887c2d1b85660e89e5cb9d231b9fa4fc08582356c8b6ff523bb85e00c2f87e3994489fab96ff25af6a5c9b7ae8513438d61d5af9f0d87ac936ede596563c38e649f3c7d5355a326699da9ea36bc7f0ff63c2c9f2393794afcc6157042f0c4798dc7551000602ab487800638e3d1b011d9bc6bdb81efffb56d9ec8e72de3f5acb5f3a001238e46e93c9b1222f6f0ce18cd99dbd97e0aedffd15eef10ab7491efa2ffd2c5afb5ca6ce090ecb6c697e9461776e209dad78f75054b9c4481a6f23fdb0a2343abd9540698fca6ceeec0daf", 0xd3}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="30ff3701712de77b263334b2ae72b4753600f00098f2f7c525a29a2cbf117d5a901ce386393e2fbe3921a6aa0030981f897b05198c4e90f27b07a7cda2d0d875e20571aad3514c94511eab00a480594fdbd6de3be04ff6ff63334e69aa646d35da8156baa4e20a3e86bc515e79c8c42f1f061db1f91dcbd4f1643db8e3993cb9cefcab4d848d7f95f4cfce73b5b18d4d957c753122bd01f089bfd92d35520f31d1483bc15085491643e879fede2b4874fca49b99b317e13a6d70558ef05a86de8c32d65ddf2c999d76954f76e58546cfcaf69bfb194629e368510f58700c4ac8b508e7", 0xe3}, {&(0x7f00000014c0)="0e90ae668c0e876732f3dde126074b00450d13cecd121719379034bb39ad2d3fac79eccac9a307c7c93dd7fe2842b392bf48dca94a97d5b7bdbc4799c8b1510728fd1997e78ad55db0f436634c6a07d4f769dddd6a89225493408c49a0188821bf7aab2336106208d5f181b82ba997ece52128b2d44547a7f7701b90d78499c58dc8342d285b0851e49b0d57db131e7d844458229bbc06d09fb824f07bd287fa35f1a15c83dd2175f686199e72aab0213c2d95aaf50fe7560922dc30730bef656515cddc4b362eaab4e635ffe1f8c497762d7a8e459b6e2340d9f62aac4570f1b3e9f15c66e8ccc1", 0xe8}], 0x6, 0x0, 0x0) [ 1111.825501] loop2: detected capacity change from 0 to 4 [ 1111.828110] FAULT_INJECTION: forcing a failure. [ 1111.828110] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.830157] CPU: 1 UID: 0 PID: 8809 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1111.830191] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1111.830205] Call Trace: [ 1111.830213] [ 1111.830222] dump_stack_lvl+0xfa/0x120 [ 1111.830266] should_fail_ex+0x4d7/0x5e0 [ 1111.830294] ? getname_flags.part.0+0x48/0x540 [ 1111.830318] should_failslab+0xc2/0x120 [ 1111.830354] kmem_cache_alloc_noprof+0x72/0x680 [ 1111.830383] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1111.830418] ? getname_flags.part.0+0x48/0x540 [ 1111.830441] getname_flags.part.0+0x48/0x540 [ 1111.830476] __x64_sys_mkdir+0xdb/0x140 [ 1111.830512] do_syscall_64+0xbf/0x390 [ 1111.830552] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1111.830577] RIP: 0033:0x7efc34338c27 [ 1111.830595] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1111.830618] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1111.830641] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1111.830657] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1111.830672] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1111.830687] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1111.830701] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1111.830736] [ 1114.914142] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1114.916728] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1114.920239] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1114.925541] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1114.928823] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 1116.948618] Bluetooth: hci1: command tx timeout [ 1118.998279] Bluetooth: hci1: command tx timeout [ 1121.044760] Bluetooth: hci1: command tx timeout [ 1123.093754] Bluetooth: hci1: command tx timeout [ 1131.904810] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1131.905596] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1131.944205] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1131.944875] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1135.335313] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1135.339121] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1135.342076] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1135.352886] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1135.356839] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 1137.428576] Bluetooth: hci1: command tx timeout [ 1139.477561] Bluetooth: hci1: command tx timeout [ 1141.526041] Bluetooth: hci1: command tx timeout [ 1143.572600] Bluetooth: hci1: command tx timeout [ 1152.532399] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1152.533549] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1152.613979] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1152.615125] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 13:36:10 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5423, &(0x7f0000000000)={0x1000}) 13:36:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_cmd={0x4e}}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r2, 0x8008f513, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'macvlan1\x00', &(0x7f0000000080)=@ethtool_wolinfo={0x6, 0x1, 0x0, "3b4cba11329c"}}) 13:36:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed, 0x0, 0x2}, 0xe) shutdown(r0, 0x1) 13:36:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4a, &(0x7f0000000000)) 13:36:10 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x6, 0x0, 0x0, 0x0, 0x40100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003080)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000001c0)=""/72, 0x48}, {&(0x7f0000000240)=""/173, 0xad}, {&(0x7f00000003c0)=""/216, 0xd8}, {&(0x7f00000004c0)=""/73, 0x49}, {&(0x7f0000000540)=""/252, 0xfc}], 0x5, &(0x7f00000006c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000000740)=@abs, 0x6e, &(0x7f0000000300)=[{&(0x7f00000007c0)=""/83, 0x53}], 0x1, &(0x7f0000000840)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x38}}, {{0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000880)=""/143, 0x8f}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/207, 0xcf}, {&(0x7f0000001a40)=""/233, 0xe9}, {&(0x7f0000001b40)=""/191, 0xbf}, {&(0x7f0000001c00)=""/82, 0x52}], 0x6, &(0x7f0000001d00)}}, {{&(0x7f0000001d40)=@abs, 0x6e, &(0x7f0000002140)=[{&(0x7f0000001dc0)=""/46, 0x2e}, {&(0x7f0000001e00)=""/130, 0x82}, {&(0x7f0000001ec0)=""/220, 0xdc}, {&(0x7f0000001fc0)=""/3, 0x3}, {&(0x7f0000002000)=""/189, 0xbd}, {&(0x7f00000020c0)=""/100, 0x64}], 0x6, &(0x7f00000021c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf8}}, {{&(0x7f00000022c0)=@abs, 0x6e, &(0x7f0000002600)=[{&(0x7f0000002340)=""/55, 0x37}, {&(0x7f0000002380)=""/183, 0xb7}, {&(0x7f0000002440)=""/12, 0xc}, {&(0x7f0000002480)=""/234, 0xea}, {&(0x7f0000002580)=""/66, 0x42}], 0x5, &(0x7f0000002680)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}}, {{&(0x7f0000002780), 0x6e, &(0x7f0000002880)=[{&(0x7f0000002800)=""/107, 0x6b}], 0x1, &(0x7f00000028c0)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x88}}, {{&(0x7f0000002980)=@abs, 0x6e, &(0x7f0000002f80)=[{&(0x7f0000002a00)=""/212, 0xd4}, {&(0x7f0000002b00)=""/169, 0xa9}, {&(0x7f0000002bc0)=""/224, 0xe0}, {&(0x7f0000002cc0)}, {&(0x7f0000002d00)=""/195, 0xc3}, {&(0x7f0000002e00)=""/185, 0xb9}, {&(0x7f0000002ec0)=""/158, 0x9e}], 0x7, &(0x7f0000003000)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}}], 0x7, 0x2100, &(0x7f0000003240)) waitid(0x2, r3, &(0x7f0000000080), 0x1, &(0x7f0000000100)) 13:36:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5452, &(0x7f0000000000)) 13:36:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 49) 13:36:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5452, &(0x7f0000000000)={0x1000}) 13:36:10 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5424, &(0x7f0000000000)={0x1000}) 13:36:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x545d, &(0x7f0000000000)) [ 1163.561413] loop2: detected capacity change from 0 to 4 [ 1163.583603] EXT4-fs (loop2): invalid inodes per group: 0 [ 1163.583603] 13:36:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4b, &(0x7f0000000000)) 13:36:10 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) r1 = getpid() pidfd_open(r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000140)={0x1f, 0xff, @none, 0xa88d, 0x1}, 0xe) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x2c0481, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000000)) 13:36:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed, 0x0, 0x3}, 0xe) shutdown(r0, 0x1) 13:36:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 50) [ 1163.753384] loop2: detected capacity change from 0 to 4 [ 1163.755755] FAULT_INJECTION: forcing a failure. [ 1163.755755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1163.756707] CPU: 0 UID: 0 PID: 9765 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1163.756722] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.756729] Call Trace: [ 1163.756734] [ 1163.756738] dump_stack_lvl+0xfa/0x120 [ 1163.756763] should_fail_ex+0x4d7/0x5e0 [ 1163.756779] strncpy_from_user+0x3b/0x2f0 [ 1163.756798] getname_flags.part.0+0x8d/0x540 [ 1163.756813] __x64_sys_mkdir+0xdb/0x140 [ 1163.756829] do_syscall_64+0xbf/0x390 [ 1163.756851] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1163.756865] RIP: 0033:0x7efc34338c27 [ 1163.756876] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.756887] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1163.756899] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1163.756907] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1163.756914] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1163.756921] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1163.756928] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1163.756945] 13:36:21 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:36:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed, 0x0, 0x4}, 0xe) shutdown(r0, 0x1) 13:36:21 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5425, &(0x7f0000000000)={0x1000}) 13:36:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)) 13:36:21 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5460, &(0x7f0000000000)) 13:36:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x545d, &(0x7f0000000000)={0x1000}) 13:36:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 51) 13:36:21 executing program 6: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7a, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x122, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) ptrace$getregs(0xe, r1, 0x1ff, &(0x7f0000000040)=""/209) r3 = epoll_create1(0x0) r4 = getpid() r5 = getpid() r6 = pidfd_open(0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x8001}) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x3f, 0x3f, 0x6c, 0x6, 0x0, 0xe5, 0x502, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x81, 0xf6d4}, 0x580, 0x4, 0x6, 0x0, 0xff, 0x8, 0x1, 0x0, 0x7, 0x0, 0x2}, 0x0, 0xf, r7, 0x8) r8 = pidfd_open(r5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r8, &(0x7f0000000000)) r9 = getpid() r10 = pidfd_open(r9, 0x0) kcmp$KCMP_EPOLL_TFD(r4, r4, 0x7, r10, &(0x7f0000000040)={r3, r8, 0x8001}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x1, 0x8, 0x6, 0x7f, 0x0, 0x3, 0x400, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000140), 0x5}, 0x1004, 0x5, 0x3, 0x0, 0xfffffffffffffffc, 0x100, 0x5, 0x0, 0x99, 0x0, 0xe7}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) pidfd_open(r1, 0x0) [ 1174.211454] loop2: detected capacity change from 0 to 4 [ 1174.218995] FAULT_INJECTION: forcing a failure. [ 1174.218995] name failslab, interval 1, probability 0, space 0, times 0 13:36:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed, 0x0, 0x6}, 0xe) shutdown(r0, 0x1) [ 1174.220930] CPU: 1 UID: 0 PID: 9787 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1174.220958] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1174.220970] Call Trace: [ 1174.220977] [ 1174.220985] dump_stack_lvl+0xfa/0x120 [ 1174.221024] should_fail_ex+0x4d7/0x5e0 [ 1174.221049] ? __d_alloc+0x31/0xa10 [ 1174.221076] should_failslab+0xc2/0x120 [ 1174.221106] kmem_cache_alloc_lru_noprof+0x76/0x680 [ 1174.221130] ? __d_lookup+0x255/0x490 [ 1174.221159] ? __d_alloc+0x31/0xa10 [ 1174.221186] __d_alloc+0x31/0xa10 [ 1174.221219] d_alloc+0x4a/0x1e0 [ 1174.221249] lookup_one_qstr_excl+0x174/0x270 [ 1174.221269] ? mnt_want_write+0x153/0x420 [ 1174.221293] filename_create+0x1ca/0x480 [ 1174.221318] ? __pfx_filename_create+0x10/0x10 [ 1174.221341] ? __virt_addr_valid+0x2e8/0x5d0 [ 1174.221389] do_mkdirat+0x9a/0x3d0 [ 1174.221419] ? __pfx_do_mkdirat+0x10/0x10 [ 1174.221457] __x64_sys_mkdir+0xf3/0x140 [ 1174.221501] do_syscall_64+0xbf/0x390 [ 1174.221535] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1174.221557] RIP: 0033:0x7efc34338c27 [ 1174.221573] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1174.221592] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1174.221613] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1174.221626] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1174.221639] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1174.221651] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1174.221664] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1174.221695] 13:36:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002200), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) 13:36:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5460, &(0x7f0000000000)={0x1000}) 13:36:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)) 13:36:21 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x40049409, &(0x7f0000000000)) 13:36:21 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5427, &(0x7f0000000000)={0x1000}) 13:36:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 52) 13:36:21 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) [ 1174.481734] loop2: detected capacity change from 0 to 4 13:36:21 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbff}, 0x14}}, 0x50) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r2, 0x1) 13:36:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4e, &(0x7f0000000000)) 13:36:21 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x40086602, &(0x7f0000000000)) 13:36:21 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5428, &(0x7f0000000000)={0x1000}) [ 1174.504780] FAULT_INJECTION: forcing a failure. [ 1174.504780] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1174.505832] CPU: 0 UID: 0 PID: 9814 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1174.505849] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1174.505857] Call Trace: [ 1174.505862] [ 1174.505866] dump_stack_lvl+0xfa/0x120 [ 1174.505893] should_fail_ex+0x4d7/0x5e0 [ 1174.505910] strncpy_from_user+0x3b/0x2f0 [ 1174.505929] getname_flags.part.0+0x8d/0x540 [ 1174.505945] __x64_sys_mkdir+0xdb/0x140 [ 1174.505963] do_syscall_64+0xbf/0x390 [ 1174.505983] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1174.505997] RIP: 0033:0x7efc34338c27 [ 1174.506007] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1174.506018] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1174.506030] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1174.506039] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1174.506046] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1174.506054] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1174.506062] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1174.506079] 13:36:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x40049409, &(0x7f0000000000)={0x1000}) 13:36:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 53) 13:36:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x40087602, &(0x7f0000000000)) 13:36:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) 13:36:31 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)) 13:36:31 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5429, &(0x7f0000000000)={0x1000}) 13:36:31 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) dup2(r1, r0) r2 = epoll_create1(0x0) r3 = getpid() epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)={0xc0000008}) r4 = pidfd_open(r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000000000)) 13:36:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) [ 1184.973050] loop2: detected capacity change from 0 to 4 [ 1184.976687] FAULT_INJECTION: forcing a failure. [ 1184.976687] name failslab, interval 1, probability 0, space 0, times 0 [ 1184.977618] CPU: 1 UID: 0 PID: 9843 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1184.977634] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1184.977641] Call Trace: [ 1184.977646] [ 1184.977650] dump_stack_lvl+0xfa/0x120 [ 1184.977675] should_fail_ex+0x4d7/0x5e0 [ 1184.977691] ? __d_alloc+0x31/0xa10 [ 1184.977714] should_failslab+0xc2/0x120 [ 1184.977739] kmem_cache_alloc_lru_noprof+0x76/0x680 [ 1184.977754] ? __d_lookup+0x255/0x490 [ 1184.977770] ? __d_alloc+0x31/0xa10 [ 1184.977785] __d_alloc+0x31/0xa10 [ 1184.977804] d_alloc+0x4a/0x1e0 [ 1184.977821] lookup_one_qstr_excl+0x174/0x270 [ 1184.977832] ? mnt_want_write+0x153/0x420 [ 1184.977846] filename_create+0x1ca/0x480 [ 1184.977860] ? __pfx_filename_create+0x10/0x10 [ 1184.977873] ? __virt_addr_valid+0x2e8/0x5d0 [ 1184.977900] do_mkdirat+0x9a/0x3d0 [ 1184.977917] ? __pfx_do_mkdirat+0x10/0x10 [ 1184.977940] __x64_sys_mkdir+0xf3/0x140 [ 1184.977956] do_syscall_64+0xbf/0x390 [ 1184.977976] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1184.977989] RIP: 0033:0x7efc34338c27 [ 1184.977999] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1184.978010] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1184.978023] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1184.978031] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1184.978038] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1184.978045] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1184.978052] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1184.978070] 13:36:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x40086602, &(0x7f0000000000)={0x1000}) 13:36:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 54) [ 1185.075076] loop2: detected capacity change from 0 to 4 [ 1185.082711] EXT4-fs (loop2): invalid inodes per group: 0 [ 1185.082711] 13:36:32 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x401c5820, &(0x7f0000000000)) 13:36:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x40087602, &(0x7f0000000000)={0x1000}) 13:36:32 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040), 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/70, 0x46}, {&(0x7f0000000140)=""/121, 0x79}], 0x2, &(0x7f0000000200)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}, 0x0) fcntl$dupfd(r2, 0x406, r1) 13:36:32 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5437, &(0x7f0000000000)={0x1000}) 13:36:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b62, &(0x7f0000000000)) 13:36:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 55) [ 1185.185942] loop2: detected capacity change from 0 to 4 [ 1185.189547] FAULT_INJECTION: forcing a failure. [ 1185.189547] name failslab, interval 1, probability 0, space 0, times 0 [ 1185.190490] CPU: 1 UID: 0 PID: 9868 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1185.190507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1185.190514] Call Trace: [ 1185.190518] [ 1185.190523] dump_stack_lvl+0xfa/0x120 [ 1185.190548] should_fail_ex+0x4d7/0x5e0 [ 1185.190564] ? ext4_alloc_inode+0x28/0x600 [ 1185.190575] should_failslab+0xc2/0x120 [ 1185.190594] kmem_cache_alloc_lru_noprof+0x76/0x680 [ 1185.190610] ? perf_trace_lock+0xb5/0x5d0 [ 1185.190626] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 1185.190638] ? ext4_alloc_inode+0x28/0x600 [ 1185.190647] ext4_alloc_inode+0x28/0x600 [ 1185.190658] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 1185.190667] alloc_inode+0x67/0x250 [ 1185.190686] new_inode+0x1e/0x160 [ 1185.190712] __ext4_new_inode+0x35d/0x4d70 [ 1185.190747] ? avc_has_perm_noaudit+0x150/0x3d0 [ 1185.190771] ? __pfx___ext4_new_inode+0x10/0x10 [ 1185.190789] ? __pfx_avc_has_perm+0x10/0x10 [ 1185.190803] ? __pfx___dquot_initialize+0x10/0x10 [ 1185.190823] ext4_mkdir+0x331/0xb30 [ 1185.190842] ? __pfx_ext4_mkdir+0x10/0x10 [ 1185.190853] ? security_inode_permission+0x72/0xe0 [ 1185.190872] vfs_mkdir+0x59a/0x8d0 [ 1185.190887] do_mkdirat+0x19f/0x3d0 [ 1185.190904] ? __pfx_do_mkdirat+0x10/0x10 [ 1185.190926] __x64_sys_mkdir+0xf3/0x140 [ 1185.190942] do_syscall_64+0xbf/0x390 [ 1185.190962] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1185.190975] RIP: 0033:0x7efc34338c27 [ 1185.190984] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1185.190995] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1185.191006] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1185.191014] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1185.191021] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1185.191028] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1185.191035] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1185.191053] 13:36:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x15, 0x20, 0x1, 0x1, 0x0, 0x7, 0x44, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000180), 0xc}, 0x4, 0x5, 0x2, 0x4, 0x800, 0x5, 0x1, 0x0, 0x6, 0x0, 0x76}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) syz_io_uring_setup(0x1438, &(0x7f0000000080)={0x0, 0x90b8, 0x1, 0x3, 0x1f0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) shutdown(r0, 0x1) 13:36:42 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000080), 0x1, 0x20c200) close_range(r1, r2, 0x2) r3 = getpid() r4 = pidfd_open(r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000000)) 13:36:42 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4020940d, &(0x7f0000000000)) 13:36:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, @in_args={0x4}}, './file0\x00'}) r3 = fcntl$dupfd(r2, 0x406, r0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000000c0)={0x80, "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"}) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) 13:36:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x401c5820, &(0x7f0000000000)={0x1000}) 13:36:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 56) 13:36:42 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5441, &(0x7f0000000000)={0x1000}) 13:36:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b63, &(0x7f0000000000)) [ 1195.108712] loop2: detected capacity change from 0 to 4 [ 1195.123116] EXT4-fs (loop2): invalid inodes per group: 0 [ 1195.123116] 13:36:42 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80045432, &(0x7f0000000000)) 13:36:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000040)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000080)={0x1, 0x0, 0x1e, 0x3, 0xf8, &(0x7f00000003c0)}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:36:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 57) [ 1195.258008] loop2: detected capacity change from 0 to 4 [ 1195.262040] FAULT_INJECTION: forcing a failure. [ 1195.262040] name failslab, interval 1, probability 0, space 0, times 0 [ 1195.263434] CPU: 1 UID: 0 PID: 9912 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1195.263455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1195.263468] Call Trace: [ 1195.263474] [ 1195.263480] dump_stack_lvl+0xfa/0x120 [ 1195.263510] should_fail_ex+0x4d7/0x5e0 [ 1195.263529] ? security_inode_alloc+0x3e/0x130 [ 1195.263545] should_failslab+0xc2/0x120 [ 1195.263569] kmem_cache_alloc_noprof+0x72/0x680 [ 1195.263585] ? __pfx_map_id_range_down+0x10/0x10 [ 1195.263612] ? security_inode_alloc+0x3e/0x130 [ 1195.263625] security_inode_alloc+0x3e/0x130 [ 1195.263641] inode_init_always_gfp+0xc94/0xff0 [ 1195.263666] alloc_inode+0x8d/0x250 [ 1195.263689] new_inode+0x1e/0x160 [ 1195.263714] __ext4_new_inode+0x35d/0x4d70 [ 1195.263744] ? avc_has_perm_noaudit+0x150/0x3d0 [ 1195.263768] ? __pfx___ext4_new_inode+0x10/0x10 [ 1195.263792] ? __pfx_avc_has_perm+0x10/0x10 [ 1195.263810] ? __pfx___dquot_initialize+0x10/0x10 [ 1195.263837] ext4_mkdir+0x331/0xb30 [ 1195.263861] ? __pfx_ext4_mkdir+0x10/0x10 [ 1195.263876] ? security_inode_permission+0x72/0xe0 [ 1195.263898] vfs_mkdir+0x59a/0x8d0 [ 1195.263919] do_mkdirat+0x19f/0x3d0 [ 1195.263941] ? __pfx_do_mkdirat+0x10/0x10 [ 1195.263969] __x64_sys_mkdir+0xf3/0x140 [ 1195.263990] do_syscall_64+0xbf/0x390 [ 1195.264015] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1195.264032] RIP: 0033:0x7efc34338c27 [ 1195.264043] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1195.264058] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1195.264073] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1195.264083] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1195.264092] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1195.264101] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1195.264110] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1195.264134] 13:36:54 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xaa\xaa\xaa\xaa\xaa') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r1, 0x1) 13:36:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1064, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:36:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4020940d, &(0x7f0000000000)={0x1000}) 13:36:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b64, &(0x7f0000000000)) 13:36:54 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000300)=0x40, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r4) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfb, 0x8000}, 0xc, &(0x7f0000000240)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="c40000002400000128bd7000fddbdf250d0016005d2d3a215c3a2b2c00000000aa356c779102250575d5ebd48bdf86a92c33f8481eb54b610dc8f5a1d272d0383ff40add33e41c5150b5ecf5782aabfb79e2c7b23591caa724e51a91abd6e73b2412902e3555b9059cd4568cd74d16d3fdef9888394e56874bcf8b354aa70672040175ae43a6138e614932ee220000de87163624fb09450d16a926007600cfd1e458be8e292cd90ab0bdabf5e5f26dd489ef2200"/196], 0xc4}, {&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x290}, {&(0x7f0000000180)={0x48, 0x2d, 0x20, 0x70bd28, 0x25dfdbff, "", [@generic="0adf25f995d1d45a74972c8ccf726540ccbf98e1ea1758dcfd955e23db2eb1658dd8f7cae702f63386558e1268f38f14b73994a0e002b3"]}, 0x48}, {&(0x7f0000000680)={0x254c, 0x3f, 0x2, 0x70bd2d, 0x25dfdbfd, "", [@nested={0x1e2, 0x72, 0x0, 0x1, [@typed={0x4, 0x1}, @typed={0x14, 0x6b, 0x0, 0x0, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @generic="d3baf2559336bfe3869e7157eca24d5d5bf3f0be3f6d407ec049163b9af2a3f5489bc2fb32f7e6476f81e3366d6f25262d0d76c0a06a33cf09f8c859019facf526c4e12c6555c6de77d97b98711c4630159fc200c97932441865d8e4e29705c598783cdd7291bde11ae560b1ed2d080491abe44f84d61fb3a9b4ca5a1ddd4858caf6564d15ac1d2555defc10b3433dc23f4ed611f990a71e50148305f3d6680414ffa77ffb7c8f57964c4e30bc7c539bea7469b5acbe", @typed={0xb0, 0x76, 0x0, 0x0, @binary="d80eae24eaa811a3ccb575b2fb6027c60088bb959ade544a219b822c90d1e400db7c20946920ace2799169e687241bb245971da6aaeba9bc1f5f7829dd4a91891db2b576e52d8fa2d29d2a94aea1bb003ad8368b25304603ca54eae35ec099e4ddf87e19ce06de0248cc6f74dc0ab57aa58284d68c197610ef79c815060ea1e233c35078199e22363b8b02e43408039a3eb1911c83347681dd781d7a9f28f588f23d7109194d76047d9fae41"}, @typed={0x8, 0x67, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="9384d43cc4dbfa0ac28b58ba2a86a3ed851d5070e2890463a08bf88b34e212c6d211f9ee2c657767b666e14f3bd4947bfaf6dc4b23298e975f109bc5a6a99cafba4312c9e2428550ff570a81a1437b037845b80410a1a775"]}, @nested={0x8, 0x9, 0x0, 0x1, [@typed={0x4, 0x4}]}, @nested={0x2112, 0x3, 0x0, 0x1, [@typed={0xc, 0x3a, 0x0, 0x0, @u64=0x4000000000000}, @generic="205b228a4f34c583623e7ce9dc263390e9c5c6e5c94963b0549953b29323896e8f24304920f7e1aa317421", @typed={0x18, 0x7f, 0x0, 0x0, @binary="47daaf726a9c4858df13829a08c2f6f0d2e75100"}, @generic="6bd8fb1ce64731aab288d9968c4017915237230b93b7f8b6e70d", @generic="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", @typed={0x8, 0x3c, 0x0, 0x0, @fd}, @generic="c4cb66aa3ae73af5933d3731fe6ca6f15cec6b46b8fbadedbc5eb2d12ee2d6f80e8e7435a18bc31bdbeb1ed698b1975cb5f80503b0bd40cb4c8f03831d9ed82d5d4d9bf01bfabd7683aac28c23534ccf770464a8cc1b5a7d75c44e3d81499bceb00830285708e10b9e810cbd8e19d083e6d3861878e6f1a88ddf96f2248eef4bd4c4cd326db45c84e18ab5519794e6ff90b0100e60", @typed={0x8, 0x2c, 0x0, 0x0, @str='[.\xa6\x00'}, @generic="7e28dc521f6d62e9de8db7a91a351aa2235f7aa39113e5985ba5140383673830ef5e27ba62a17377e5ba7c14b81badd9052e6814831bf9b65e16bc87773e2e5b48e8b135936523e2a2844f761842102a388da6dfb63e032c5a7a40c29edaed38fe2cae44361ec69ca9284e746a545f2aa439b77539530e22084a5220612a182c59601ec91d5af038bc4c4bddc8a5ce261db5d79577a4fdd3c88590e37abf09a92da200a71b46b839813c8a23d016e956c00cd233dc9ee04387bbc5d98151d4ad0c02d294e5d652318bdb4bf45426c79c4f5e8cb59f1864dd892e722901186b52661e4054111369666360fbe57f92f36ba7cac7c318c56c7577250b95671ebf77b73ec305345e1ce4ec84d17695a58096bd8f20837e8553a80c04b4fc2fbf4630e77396bc15a4225fec8d6a560d40711a5e5907836f854a8ad713204029961c5e41d977fd84d7a5a8af2552a29b19e19634f8c210a46cef7540ca2655355f0a34c078ec601fe28b5a9f1a7b6e98965e0c9093989bb14cc00f5cb36764bede27155e3bafa1ab265224edd75cc50391b3d3704942ef98f7429f2383c0f0bfd7c1ef59792bc85ec5b8b55365eb54c40c55cd75944d3b8f553c4c77b86d898f760746432b528a2f898b9da1398df3bb5849e33c80387420a8f22e1ca9b2e4a5ec837c9555613d72e0e4b06d8cb18fc8da46c9a0020f5b4ecf89ed1126ec1e39cb626b6f0b7394df7342e139c5628cde02ed7080e8671b0e156abb66f841608f6529676943a898696f2ee087a3f7d88b1e0a1af4b5a60470712903eaa2de02ebf43f02ca6f676834d156dc709a43ed1037c4779ae7659e4af27eedfb75174244b71660bf114be17e0655ce03f774408b4f012d933b1c7e74057be600b41dfed5d1c64e6ab74efb3d24c4a5cad8c81f7f6cb82d44c65033bda5dcb03ba95ed30332edfbbb227ed555bbdae42372fad833cf01fa7d0058e10762f1122f94288a2eb14554fa23d8835955f1e574c52cd7deefa1ab7ffaa18bde3eab94e8f45aee1ed484a3435b4a56ce10e1ae7a67877a897312a0326cead8e170b4ac35fd702c4fd283736ba0aa2ba207090a299c49bd3423222277423e4f32bfb6ca9dff9ee4deb3b0f973527c4cf16046f696b1ec9587560278c6f6f847b1ce4db80ef9cdf8f1f6717139350ab817dad88c64e5885d95df5fe7cd9233802da146cd017b30ab0cd0af7bb65dec99fc66d66a71ccebace7c54dd3efe095c966d1af62d3b7f4a300d17fe9a12af73123966468736b0a2b3f47eb25a7723bbe8087af9bb9ea19f1b69bcbf906bbc4d40b624e8bd58d4bfaede5c921f47d33224244311aaf4ac82f373d04c272696078c492bd902dab02c1208dbdd5e893be89d019654e99dc29ebb6050500e72f9b4db13062986b44b95d80d1a7f5ed854be24e10b004323a5846524b636c1a5e35499e9925071221513538a49ff807b8dc3a81df5480c39726d9343c69654ec9cd6ed9be5c58042af35a3c2896ed7aabc69cf5e38f63a0499691820ad397cd27346b27957eba44c08995d237bf117449905987a1c7e9b35104c129f74acff2402612f36f83809264080eadf9402f631d78fbaf66223c63b22c7b12112cb7179878ff3995b13706ca907fc20bec749f482e68a24c994f0a516df51f7f49b5940fda6f8fd7631f36fdd829297a1365e16c5a0ec6894f4901edcf90b1034588323f5eb12997133511238b537f396b98fd8ee8d47d3f79bd444baad792e6dc288d368efbad94bf2f2762fca9576e3349c7376259f28ee09d42ca18bd8f6dcd62186b5ba09e28f5d4762c138c165345e16d723f3dab8fac559b3bac80e67ef99a1bdf3c359073c4c946f06e04c9d5e8e95fef54abac8552444c5e19112ec1ccda48c40295add69209cb27c41f0594ab0604b80016dbdb42b4b8b5edd86856ab2bb21e74336190acf186fd0e39e44b1ac211319059d2aa3a20803148e6c25ef2b382e06a6a5bf65cb9ee4f48b4d2158af2ae0fdf2acd874dc031d3c38176337c26a9a90046427ad9fe3593af02d47f661647c88f0811d6a4659a66a8e4f9d9f6cac3ce0656759df4c016ed9ab755ffd73568c709c582d8fae6ec05c78b25ff220dc2f5c00b6be2a8ec294f77e91e7d0b849bc8f40e835d30781a4053b245226839058b0c6dbb4019b62a8ec505a2598fc1df4b8e9de5d042a51e3f5c4bca1a16b84bcdeb04d06920d9009efccc0da453e12dda690c4ff5c15ea56fdb250aced6cf19fb3d06dc0e1ebe8905bc9ae3d5b7b96094a751a55ddac544246e166a6900c5643a019eb001e355d609ea267d084fb2e38e58f612b5116f88acd742764eb0688bde9f69172f023e4b738b850f594b6c5f497c604eeb59fd0284e1cabea6ad571ae27b07bf4c419280ba6996b93545f06f3a0387e709648c4f3954d8fa1f4e58576ddb8278945637c9a27556de3a0859e83cc9b5bd97da57734369adc882b6eecde1c6435b341000b17c8489961174c155f15d62580531b33e964597696832a093763884e5e67c6676f26a7d2c588849a55f99d3f70b8a1ba3fa1e7609e8e1c2003efcb835f80554c9a992dc8435b2144633a2684449276425ab758eb3eacde118bbd617a10e24e8c0a11933943d189d077b542f94bdac6089a1c34b08b038cf24bc3446799b3151f257b0846aaf4a6d38a478ad2d5c567f908289d0a476a26b921fc4e869d77e5760f7b0a0185e381057e08a4bee6a744f9c6585ba46db33943162de2a36e1f42524c6a4e65e69acb2101af856e20201fa476d92d1ec6461f70fe46d641893fbea895d73392314e15f89e7c7ad2db2b5d768118937b4d1ed8b3a53a625ab1a51c8a7bbf73bc2537564fdad0c94caa8f441d474fefabd13371d6b55389fdd31036646ee991a16cf7f7a68227e495b8a4c17cc1ed7645622234b17abb60f70ebcba0083db17475e01e4a8a0a047f9030dff2599035b8dca7427509073f0e4bec3650b49c94940bbe6e68a90dca5974d1873f2914545e56fc771e2913e90f70ae73d6ee4ea766a59871181ab35a1916bc4050914fa37a9f8067963b23a848164e36571d8c4e9775f757d045fb2c13de2a3624c73b1dba6eef2e510b94e6665a0c28fd555800688ffe949428d9b3848711a6394993dc0f505f2f10ec12b9a957c657d703329310d93b17448668da80192903839660a0e988d47c6d3e2950dedd30f0004af4979890003e4dd4b7b3f5100517534d8886b5e16faa904779b4cce00c3a75fb3d0bb7300203a7576edd1fa942bd52a09bc6943a6428d6e843a5f6deb2c115ba4174b59e5f7c0b87e06173a74a433fe371ea7af72cceeb2c504d5fb3a030916fde1acbc950689867676a97137ca075e7f933fdfc3e5f01dee192b040f038fd31939281b6de461d7ec3e6e01bfac917d10dc5b14e875a7256176b8f121c110afa242b27b05294aec9de8cec923db35b02931b028142d9708c1c12cd220213f6c5e06fb1f8868d35cc5fc47b23066db29f18a40819c7cdb9505c1f2c1fb9639891fa1846be9bcd67b564bfe705ae45e7598d0238867ca6a9644a5043579881637b4701b948c0e4d44ec8753f48517f8d66d0aede73c4946fafb3e1ead6042a3c1af26fe51f8d21bbaa40cf97cee20682e38e0ef71b91f9138cc5d2f6b3a52c47b014d4eaa81bc4b2bdaff1d2a893892927447929868cebb75e2e050d8ef813eafadaadadcd6c91cc9938e51808a8e205056dd9d7de016dd3ed9f0747c816e3e664801449cd7bb9c8245c2bed3a8d08041c09f8e9a3da295dc934d257cce69ad25582823b916cd1e47d5b96fcc0f20e6a9b2fdc07cef3c89eb509ecd7d9c98d67f8962727c1f0ab827d5776879eaa423d0b1a3ec5ad6fa4b649b56f342997dd5c00477e4aa08adfe86caa7635e96009f4e73474b7c72631088b5dadd6353c056374a8257830de4ceca5905e2e6e8dbc489f98026fa87611ef69352ecf4c714fd4e666393ddc0858bc49623769fc7c3e74cff701bf454e9e0ecd64e9275d26b90ab4779ee83333d67f7b6645ec1fb628c3a850fe5cbf248903db0d8dce029994d41dbedc0929c4d9c06e11231612a54b607281908e1d78fcd8454d04c624421edd42112509d9e2a9c542cbbfb189866984822b154eaef551a10bc953099ffca2c34690be964820e5b13e2aa879a10f257e4440fd79676058fd35cabb4a9df1837e49b5faa658378b2f061fa00053793f75612b94246520f189640f07b678d7a773d19d9bf5a4f38c227930968a2ff2afae69c5f8cdd1fbfd3600d83a8952fa6b0318135c240a5cd5fbe7174a4014e89807f68faaa7bb094ed908b85e8131828482280e49faf536abdd4f2db052d6b923efed8b6f5205aac1a819688f57225f14cf6ee73ec05a12b653738d4befd5a30d1397b7af2564dadd3bcaccaa9c85a01aa40ba90a461da3f9d8cb504dd6208226fba4cb9c50cdbd34897350fcf91b3de16653e166af1c3e33a71915e5d2a82bc5026c5108419bd3f5358a14c17256b6ce19985715bd6a73a70e50fd9cfb9d2825ca07bfba452334d744df44373672b4f92059f1edcae6f92df2351ae3c3f37ff689eb228dd9a7c60b79ce0d6768163760a3f67575619f1ee815e68ffc424480dbc37cc9873fcfce5155574c876271cac40431eb008a3aa2df7a9297d5fa7b60650632f51b2b18d2fb8b04d4ee2409a250909e1eb66b97668bcc307e3ffd2b74bf8f9c67d4f76a9aecf493bf62d9e9b41523366bd510dde5922e528f9e79b82c54fc03e29f05e68c1b41b12064812bda0682bcbc2fe003b1c682cc29fb182a41e9b93c0d19b3bc2e93620dfa20994770560d61dd097958267a7decabb9f87559b1b05d54a1abfebb4d010c023d42f8623579790b393c747253719bcf01e1297f7a776a96b4d5e2f376821cdecc9f9432fc4388e3c9e40afdf44656035a4adcbe156ca2e9800a43e3d2724039e10705115d389a112c66bb508b4d448dbef1ef7fbbe3ce0bc32457f1c0f4df39999c3ee64322543b5fcf60b57f8f80ffc62871974808452e6568eb93a014454de172ebfedeafbc2d9b7362a30201aba4d4429d4817b1bc33421c8c89f0f0dc3835b7d4d3e7902d385c78eaf7bc6624294a92cc98637fe92f39a60bda1c92068d19f07423306c0f6007a962bc870259fb61786ac4e2fd116763eae9528bcf3b2aab2d9baec411c786080ee9670ce390be4cf7526a5f4498d0300f2319ce93e67b03dc578a281f989b14fcbdb50fc08e58f112e60675cd3029309e1751ad1e3d466c86814323852074dcd178dbcc42d369b4ed21bb2da10f253497a13e86679652fc7587bd24684d08999d49778beb88250c8933ca14c98aa253c83ab1851562050014a8bd98533ae4c82d98feff11f17b3537c464b04ae10f80830438f95fd4b83638dc6bb8a1fa32f94c611885d52f2810d5f2e287cad1490642396e1cd10f130dea7afeec0d263295e13b749fd680d97b7938b0976459b4772c463c4c13b3ac8cbb5c919d946beab97349ea55ae29db879451d92a63612a8b1f7c5d478cd6481f6a1bba54801bc8d3fb51751ebc4e7b27d6a15a3e60789c7d72a9d65c9fa2f39836ab688e96b06ee00df4b647212385f4bc08ab862c0237a1fb88d9f7c0e1f2d91dedec883289600a3350ddd47947385f96c86afd5f923a2898ff0c3ed93cf303fc5d78c98f7e199f8cbd1cbc7213504a72ce396e81bdefb49858967897edc56805ec68448ed4c4dfc73a8d2221e563e62993223403e9eeb9ab210f811c"]}, @generic="a8392eabf38a80f87e4f622e0212f6f2d75a8b7a3d3d2f338ac60f113016e64f1a21dcfeb0c293c4bb615fcd04fd6a35e1ba18ea57ecd3fb687e101975ba607bd2eba0b984d7e1c5cccd1379d4fd53a59ae2c3d053a507e9ff9afc0b4e73933089e690fd9deec37f5ef331aa8bbdb3326b11b35de55f844165fbf48432fbaa89eb6b99d514686a663c81c9ec8564ce0ee878c5e915ece811494eae3c7669df3918968c0ae103b710db50bc426b43e1cfea9a99ed4bf386dcad10a3f265fa458c7c", @nested={0x177, 0x5, 0x0, 0x1, [@generic="eb5667bcbc6260af28c2a68cafa3ee162ca2fdf758061dd1eb724d675707f0ded84e0b623574b70563f619e7ab5f6751ea686db7a75578c6bf3286ed515586a4ab3c859762b85f624294c9065f15a15ea38ad01a5b2563241786b4bb1e13eb1c9b63e1fb19a5c42fc6ea7418da1e665fe2acba03891c9fe117f0ead20c5afa4651391e11c6b4fa21", @generic="db24a08549b2b1680b469415bd1cb5bd", @typed={0x8, 0xc, 0x0, 0x0, @ipv4=@remote}, @typed={0xc, 0x2b, 0x0, 0x0, @u64=0x8}, @generic="20d42318e5d470fe6bab41ed442010015aa4b77af02d56a8e1f66ca353627f5d5ed73dc0722936d1c742099c7ac018295e60ff9cb299dcad86fd355005636d", @generic="a598fc8bcac9065483edf460630ef2e85cab92c130be96bef6526cd041bc1d79eeadd228e3d2354e84245b3ebecd734b452838fac9fbc53b9494bfd4c238b4d4ee60f298c6e8b2d36a173a8fa05ebe3ec4c78d4889a108b54f27e0d1feefffb186797365ecd172c3", @typed={0x8, 0x59, 0x0, 0x0, @uid=r1}, @typed={0x8, 0x1b, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x21, 0x0, 0x0, @pid=r2}, @typed={0x8, 0x50, 0x0, 0x0, @fd}]}]}, 0x254c}], 0x4, &(0x7f0000000280)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r4, 0xee01}}}], 0x38, 0x4040}, 0x4080) perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = epoll_create1(0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002cc0)='/sys/class/hidraw', 0x20000, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r6, &(0x7f0000002c40)={&(0x7f0000002c00)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x4000010) r7 = getpid() r8 = pidfd_open(r7, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r8, &(0x7f0000000000)) 13:36:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 58) 13:36:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80045440, &(0x7f0000000000)) 13:36:54 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5450, &(0x7f0000000000)={0x1000}) [ 1207.425432] loop2: detected capacity change from 0 to 4 [ 1207.447716] EXT4-fs (loop2): invalid inodes per group: 0 [ 1207.447716] 13:36:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b65, &(0x7f0000000000)) 13:36:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80086601, &(0x7f0000000000)) 13:36:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 59) 13:36:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80045432, &(0x7f0000000000)={0x1000}) 13:36:54 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x12) 13:36:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x108800, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000080)={0x85, 0x7, 0x300, 0x7, 0x5, 0x2}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:36:54 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5451, &(0x7f0000000000)={0x1000}) [ 1207.592876] loop2: detected capacity change from 0 to 4 [ 1207.595079] FAULT_INJECTION: forcing a failure. [ 1207.595079] name failslab, interval 1, probability 0, space 0, times 0 [ 1207.596149] CPU: 1 UID: 0 PID: 9953 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1207.596166] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1207.596173] Call Trace: [ 1207.596178] [ 1207.596183] dump_stack_lvl+0xfa/0x120 [ 1207.596207] should_fail_ex+0x4d7/0x5e0 [ 1207.596223] ? jbd2__journal_start+0x193/0x6b0 [ 1207.596237] should_failslab+0xc2/0x120 [ 1207.596255] kmem_cache_alloc_noprof+0x72/0x680 [ 1207.596269] ? lock_is_held_type+0x9e/0x120 [ 1207.596286] ? lock_is_held_type+0x9e/0x120 [ 1207.596305] ? jbd2__journal_start+0x193/0x6b0 [ 1207.596317] jbd2__journal_start+0x193/0x6b0 [ 1207.596333] __ext4_journal_start_sb+0x325/0x5d0 [ 1207.596355] __ext4_new_inode+0x2cbe/0x4d70 [ 1207.596383] ? __pfx___ext4_new_inode+0x10/0x10 [ 1207.596403] ? __pfx_avc_has_perm+0x10/0x10 [ 1207.596419] ? __pfx___dquot_initialize+0x10/0x10 [ 1207.596440] ext4_mkdir+0x331/0xb30 [ 1207.596459] ? __pfx_ext4_mkdir+0x10/0x10 [ 1207.596475] ? security_inode_permission+0x72/0xe0 [ 1207.596494] vfs_mkdir+0x59a/0x8d0 [ 1207.596510] do_mkdirat+0x19f/0x3d0 [ 1207.596527] ? __pfx_do_mkdirat+0x10/0x10 [ 1207.596549] __x64_sys_mkdir+0xf3/0x140 [ 1207.596565] do_syscall_64+0xbf/0x390 [ 1207.596586] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1207.596599] RIP: 0033:0x7efc34338c27 [ 1207.596608] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1207.596619] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1207.596631] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1207.596639] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1207.596646] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1207.596653] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1207.596660] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1207.596678] [ 1207.612052] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory [ 1210.388566] Bluetooth: hci1: command 0x0405 tx timeout 13:37:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80045440, &(0x7f0000000000)={0x1000}) 13:37:05 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x7f, 0x7, 0x3, 0x0, 0x9, 0x2, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x3, 0x1f}, 0x50010, 0x6, 0x5, 0x7, 0x2, 0x9, 0x78, 0x0, 0x1000000, 0x0, 0xbf}, r2, 0x7, r0, 0xa) bind$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0xcd, @any, 0x4}, 0xe) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r1, 0x1) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x5, 0x2}}, './file0\x00'}) syz_open_dev$sg(&(0x7f00000001c0), 0x1, 0x5a100) bind$bt_l2cap(r3, &(0x7f0000000180)={0x1f, 0xfe00, @any, 0xfff, 0x2}, 0xe) 13:37:05 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5452, &(0x7f0000000000)={0x1000}) 13:37:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b72, &(0x7f0000000000)) 13:37:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80087601, &(0x7f0000000000)) 13:37:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 60) 13:37:05 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0xeb, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x10, 0x0, 0x4d) r1 = epoll_create1(0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x82080, 0x0) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000080)={0x1, 0x1ff}, 0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) 13:37:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) read(r1, &(0x7f0000000040)=""/102, 0x66) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000004300)) clock_gettime(0x0, &(0x7f0000003e40)={0x0, 0x0}) r5 = syz_io_uring_complete(0x0) openat(r5, &(0x7f0000000300)='./file0\x00', 0x547040, 0x0) recvmmsg$unix(r1, &(0x7f0000003cc0)=[{{&(0x7f0000000040), 0x6e, &(0x7f00000007c0)=[{&(0x7f00000000c0)=""/125, 0x7d}, {&(0x7f0000000140)=""/255, 0xff}, {&(0x7f0000000240)=""/181, 0xb5}, {&(0x7f00000003c0)=""/254, 0xfe}, {&(0x7f0000000300)}, {&(0x7f00000004c0)=""/232, 0xe8}, {&(0x7f00000005c0)=""/98, 0x62}, {&(0x7f0000000640)=""/90, 0x5a}, {&(0x7f00000006c0)=""/150, 0x96}, {&(0x7f0000000780)=""/46, 0x2e}], 0xa, &(0x7f0000001740)=ANY=[@ANYBLOB="24000000000000ea3f77527cbf0237f7000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="00000000d130596efa15941a1a1fd9ca934dd06bcc895b6cda5311f3b2c1f3260012da36b37b5cd54d0eacbcf981000000"], 0x28}}, {{&(0x7f00000008c0)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000940)=""/59, 0x3b}, {&(0x7f0000000980)=""/14, 0xe}], 0x2, &(0x7f0000000a00)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000a40)=""/154, 0x9a}, {&(0x7f0000000b00)=""/168, 0xa8}, {&(0x7f0000000bc0)=""/174, 0xae}, {&(0x7f0000000c80)}, {&(0x7f0000000cc0)=""/100, 0x64}, {&(0x7f0000000d40)=""/149, 0x95}], 0x6, &(0x7f0000000e80)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe0}}, {{&(0x7f0000000f80)=@abs, 0x6e, &(0x7f0000001600)=[{&(0x7f0000001000)=""/104, 0x68}, {&(0x7f0000001080)=""/254, 0xfe}, {&(0x7f0000001180)=""/166, 0xa6}, {&(0x7f0000001240)=""/106, 0x6a}, {&(0x7f00000012c0)=""/56, 0x38}, {&(0x7f0000001300)=""/65, 0x41}, {&(0x7f0000001380)=""/180, 0xb4}, {&(0x7f0000001440)=""/146, 0x92}, {&(0x7f0000001500)=""/195, 0xc3}], 0x9}}, {{&(0x7f00000016c0)=@abs, 0x6e, &(0x7f0000001800)=[{&(0x7f0000003f40)=""/178, 0xb2}], 0x1, &(0x7f0000001840)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x50}}, {{&(0x7f00000018c0), 0x6e, &(0x7f0000003b80)=[{&(0x7f0000001940)=""/21, 0x15}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/104, 0x68}, {&(0x7f0000002a00)=""/22, 0x16}, {&(0x7f0000002a40)=""/4096, 0x1000}, {&(0x7f0000003a40)}, {&(0x7f0000003a80)=""/38, 0x26}, {&(0x7f0000003ac0)=""/142, 0x8e}], 0x8, &(0x7f0000003c00)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000200000000000e0ff0000000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xa0}}], 0x6, 0x40000100, &(0x7f0000003e80)={r3, r4+10000000}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r7, &(0x7f0000000040)=""/102, 0x66) ioctl$F2FS_IOC_RESIZE_FS(r7, 0x4008f510, &(0x7f00000042c0)=0x3f) read(r6, &(0x7f0000000040)=""/102, 0x66) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000004400)={&(0x7f0000004340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000043c0)={&(0x7f0000004380)={0x20, 0x0, 0x4, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x1ff, 0x10}}}}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x200000d0}, 0x20048011) recvmmsg(r6, &(0x7f0000003a40)=[{{&(0x7f0000003ec0)=@xdp, 0x80, &(0x7f0000004200)=[{&(0x7f0000004000)=""/161, 0xa1}, {&(0x7f00000040c0)=""/93, 0x5d}, {&(0x7f0000000880)=""/18, 0x12}, {&(0x7f0000000c80)=""/41, 0x29}, {&(0x7f0000004140)=""/151, 0x97}], 0x5, &(0x7f00000017c0)=""/64, 0x40}, 0x5}], 0x1, 0x40010100, &(0x7f0000004280)={0x77359400}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) [ 1218.984633] loop2: detected capacity change from 0 to 4 [ 1219.001701] EXT4-fs (loop2): invalid inodes per group: 0 [ 1219.001701] 13:37:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 61) 13:37:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4bfa, &(0x7f0000000000)) 13:37:06 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x545d, &(0x7f0000000000)={0x1000}) 13:37:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80111500, &(0x7f0000000000)) 13:37:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80086601, &(0x7f0000000000)={0x1000}) 13:37:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) write$tun(r3, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1e, 0xa, 0x1e9, &(0x7f00000003c0)}) r4 = getpid() pidfd_open(r4, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x5, 0x4e, 0x0, 0x0, 0x1b7, 0x20460, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x100000001, 0x7}, 0x608, 0x3ff, 0x9, 0x7, 0x4fcf, 0x80000000, 0x5, 0x0, 0x5, 0x0, 0x7fff}, r4, 0xb, 0xffffffffffffffff, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xa) ftruncate(r1, 0x7ff) r6 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r6, 0x560a, 0xfffffffffffffffd) 13:37:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4bfb, &(0x7f0000000000)) [ 1219.195950] loop2: detected capacity change from 0 to 4 [ 1219.204594] FAULT_INJECTION: forcing a failure. [ 1219.204594] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.206834] CPU: 0 UID: 0 PID: 10002 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1219.206869] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.206883] Call Trace: [ 1219.206891] [ 1219.206901] dump_stack_lvl+0xfa/0x120 [ 1219.206947] should_fail_ex+0x4d7/0x5e0 [ 1219.206977] ? jbd2__journal_start+0x193/0x6b0 [ 1219.207006] should_failslab+0xc2/0x120 [ 1219.207044] kmem_cache_alloc_noprof+0x72/0x680 [ 1219.207072] ? lock_is_held_type+0x9e/0x120 [ 1219.207109] ? lock_is_held_type+0x9e/0x120 [ 1219.207149] ? jbd2__journal_start+0x193/0x6b0 [ 1219.207176] jbd2__journal_start+0x193/0x6b0 [ 1219.207210] __ext4_journal_start_sb+0x325/0x5d0 [ 1219.207259] __ext4_new_inode+0x2cbe/0x4d70 [ 1219.207317] ? __pfx___ext4_new_inode+0x10/0x10 [ 1219.207358] ? __pfx_avc_has_perm+0x10/0x10 [ 1219.207389] ? __pfx___dquot_initialize+0x10/0x10 [ 1219.207432] ext4_mkdir+0x331/0xb30 [ 1219.207480] ? __pfx_ext4_mkdir+0x10/0x10 [ 1219.207505] ? security_inode_permission+0x72/0xe0 [ 1219.207544] vfs_mkdir+0x59a/0x8d0 [ 1219.207578] do_mkdirat+0x19f/0x3d0 [ 1219.207615] ? __pfx_do_mkdirat+0x10/0x10 [ 1219.207662] __x64_sys_mkdir+0xf3/0x140 [ 1219.207698] do_syscall_64+0xbf/0x390 [ 1219.207740] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1219.207766] RIP: 0033:0x7efc34338c27 13:37:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x801c581f, &(0x7f0000000000)) [ 1219.207785] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.207809] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1219.207834] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1219.207852] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1219.207867] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1219.207883] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1219.207898] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1219.207936] [ 1219.243050] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory 13:37:06 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed, 0x0, 0x2}, 0xe) shutdown(r0, 0x1) 13:37:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5409, &(0x7f0000000000)) 13:37:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80087601, &(0x7f0000000000)={0x1000}) 13:37:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/tty/drivers\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x4, 0xe1, 0xfa, 0x2, 0x0, 0x200, 0x20180, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0x1, 0x1f}, 0x6202, 0x8, 0xb, 0x4, 0x8, 0x36, 0x6, 0x0, 0x6, 0x0, 0x9}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r1, 0x1) 13:37:15 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) write$tun(r3, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1e, 0xa, 0x1e9, &(0x7f00000003c0)}) r4 = getpid() pidfd_open(r4, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x5, 0x4e, 0x0, 0x0, 0x1b7, 0x20460, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x100000001, 0x7}, 0x608, 0x3ff, 0x9, 0x7, 0x4fcf, 0x80000000, 0x5, 0x0, 0x5, 0x0, 0x7fff}, r4, 0xb, 0xffffffffffffffff, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xa) ftruncate(r1, 0x7ff) r6 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r6, 0x560a, 0xfffffffffffffffd) 13:37:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80811501, &(0x7f0000000000)) 13:37:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 62) 13:37:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:37:15 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x5460, &(0x7f0000000000)={0x1000}) [ 1228.687499] loop2: detected capacity change from 0 to 4 [ 1228.697855] EXT4-fs (loop2): invalid inodes per group: 0 [ 1228.697855] 13:37:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x540b, &(0x7f0000000000)) 13:37:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 63) 13:37:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc0045878, &(0x7f0000000000)) [ 1228.801764] loop2: detected capacity change from 0 to 4 [ 1228.805889] FAULT_INJECTION: forcing a failure. [ 1228.805889] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.807064] CPU: 1 UID: 0 PID: 10048 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1228.807080] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1228.807088] Call Trace: [ 1228.807092] [ 1228.807096] dump_stack_lvl+0xfa/0x120 [ 1228.807120] should_fail_ex+0x4d7/0x5e0 [ 1228.807136] should_failslab+0xc2/0x120 [ 1228.807154] __kmalloc_node_track_caller_noprof+0xc1/0x760 [ 1228.807171] ? lock_acquire+0x15e/0x2f0 [ 1228.807185] ? sidtab_sid2str_get+0x85/0x6f0 [ 1228.807197] ? sidtab_sid2str_get+0x17e/0x6f0 [ 1228.807213] ? kmemdup_noprof+0x2b/0x60 [ 1228.807226] kmemdup_noprof+0x2b/0x60 [ 1228.807238] sidtab_sid2str_get+0x17e/0x6f0 [ 1228.807253] sidtab_entry_to_string+0x33/0x110 [ 1228.807274] security_sid_to_context_core+0x350/0x620 [ 1228.807296] selinux_inode_init_security+0x433/0x650 [ 1228.807310] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 1228.807322] ? trace_kmalloc+0x1f/0xb0 [ 1228.807339] ? current_umask+0x12/0x80 [ 1228.807357] ? security_inode_init_security+0x13d/0x390 [ 1228.807380] security_inode_init_security+0x1e6/0x390 [ 1228.807398] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1228.807411] ? __pfx_security_inode_init_security+0x10/0x10 [ 1228.807432] ? crc32c+0x1ae/0x350 [ 1228.807452] __ext4_new_inode+0x3452/0x4d70 [ 1228.807483] ? __pfx___ext4_new_inode+0x10/0x10 [ 1228.807503] ? __pfx___dquot_initialize+0x10/0x10 [ 1228.807524] ext4_mkdir+0x331/0xb30 [ 1228.807543] ? __pfx_ext4_mkdir+0x10/0x10 [ 1228.807555] ? security_inode_permission+0x72/0xe0 [ 1228.807573] vfs_mkdir+0x59a/0x8d0 [ 1228.807589] do_mkdirat+0x19f/0x3d0 [ 1228.807607] ? __pfx_do_mkdirat+0x10/0x10 [ 1228.807628] __x64_sys_mkdir+0xf3/0x140 [ 1228.807645] do_syscall_64+0xbf/0x390 [ 1228.807665] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1228.807677] RIP: 0033:0x7efc34338c27 [ 1228.807687] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1228.807698] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1228.807709] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1228.807717] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1228.807724] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1228.807731] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1228.807738] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1228.807756] 13:37:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80111500, &(0x7f0000000000)={0x1000}) 13:37:15 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) write$tun(r3, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1e, 0xa, 0x1e9, &(0x7f00000003c0)}) r4 = getpid() pidfd_open(r4, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x5, 0x4e, 0x0, 0x0, 0x1b7, 0x20460, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x100000001, 0x7}, 0x608, 0x3ff, 0x9, 0x7, 0x4fcf, 0x80000000, 0x5, 0x0, 0x5, 0x0, 0x7fff}, r4, 0xb, 0xffffffffffffffff, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xa) ftruncate(r1, 0x7ff) r6 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r6, 0x560a, 0xfffffffffffffffd) 13:37:15 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x40049409, &(0x7f0000000000)={0x1000}) 13:37:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x540c, &(0x7f0000000000)) 13:37:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44889, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x40, 0xff, 0x4, 0xdc, 0x0, 0x2, 0x24, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x92fc, 0x1, @perf_bp={&(0x7f0000000040), 0x8}, 0x4d820, 0x9, 0x7, 0x7, 0x7ff, 0x207, 0x1, 0x0, 0x1f, 0x0, 0xdb}, 0xffffffffffffffff, 0xa, r1, 0x2) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:37:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x801c581f, &(0x7f0000000000)={0x1000}) 13:37:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x540d, &(0x7f0000000000)) 13:37:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 64) 13:37:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc0045878, &(0x7f0000000000)) 13:37:25 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x40086602, &(0x7f0000000000)={0x1000}) 13:37:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x803, 0x0, 0x0, 0x0, 0x3, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:37:25 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) write$tun(r3, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1e, 0xa, 0x1e9, &(0x7f00000003c0)}) r4 = getpid() pidfd_open(r4, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x5, 0x4e, 0x0, 0x0, 0x1b7, 0x20460, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x100000001, 0x7}, 0x608, 0x3ff, 0x9, 0x7, 0x4fcf, 0x80000000, 0x5, 0x0, 0x5, 0x0, 0x7fff}, r4, 0xb, 0xffffffffffffffff, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xa) ftruncate(r1, 0x7ff) r6 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r6, 0x560a, 0xfffffffffffffffd) 13:37:25 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r2 = eventfd2(0x0, 0x0) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f00000007c0)=[&(0x7f0000000180)={0x0, 0x0, 0x2, 0x5, 0x0, r2, 0x0}]) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000800)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/102, 0x66) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000a00)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) r8 = syz_mount_image$nfs(&(0x7f0000000a80), &(0x7f0000000ac0)='./file0\x00', 0x1, 0x2, &(0x7f0000000c00)=[{&(0x7f0000000b00)="f0c71f32a7174df0f0c3c806388fb501aa645ada7a5af017076dfa4baae3056445bc0d55ee107d076b5c81c6b9efed670565764ce966eaacfaaf26cc11e80e00455adf4f26f596fac5c0872ad3a8061ae2cf1daecbd825a55654d99a2ee0c0e85419aaa7c052319ce00aecb47418e0586eae347937dae33b621159c6438c0974a63a028a7262", 0x86, 0x2}, {&(0x7f0000000bc0)="9f2e83f98c3f31937ce1f041a63cd1bc6aac72ed497bc03a675dc351f1d981c120700b0e7858dc371a2d19af525350ab890d60bb9a26a05c", 0x38, 0xa48a}], 0x950400, &(0x7f0000000c40)={[{'*'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@permit_directio}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000d40)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000000e80), 0x0, &(0x7f0000000ec0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x100}, 0x10002) io_submit(r3, 0x5, &(0x7f0000001040)=[&(0x7f0000000840)={0x0, 0x0, 0x0, 0x7, 0x7, r1, &(0x7f0000000780)="9ae15e3dec33ad50de53de5c118bccc00af40d88c8243267a23825d8fa425fc76a768107a4dc805cc4d995134c6e533d6845048a3e60712f9e8c362147f13345fd3f1a35f506405710b2dc1233339d85ead84034f3eafb31", 0x58, 0x3, 0x0, 0x2, r4}, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x3, 0x5, r0, &(0x7f0000000880)="9b48f5d0a90354307828cf0235f9adbceab0933ca1535a09388996740ef669b7b2d039ed8c112966645beda516da720c1cc4b6b6bdae0e394ed100222591649dcf24ede9c3efb0987068b0d76841982dc11e05078adbd7c0bdeffddaa58646bfea5f2aa8c39caa1dfe045ddc06a6b5841df44113d1acae852a69428af52eafde139d90e2b73b2735b7b555047c4c63aa49ba45a16bc5a5d232344a0c2170", 0x9e, 0x3, 0x0, 0x3, r5}, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x6, 0x4, r6, &(0x7f0000000980)="e8d4df8573960ed5e691ee7ee263ccab276e2dc17d09cfd3180969ae6d75f831b7a324267138c49015f0f06a92e5d1ca7fddf66efbe4bc4d059f01dd8037a815c72e3d2772d22368c05af08ec16c42b370cf97ed23b5e5a672d287b5c827eaf875f357b42b155ffc1a357640b6472c634150", 0x72, 0x8000, 0x0, 0x0, r7}, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x5, 0x8000, r8, &(0x7f0000000c80)="00abd51485356fc1b683372334e1a81104497ad7a2032c472390c0ab08935a20d7e3a44a4d7cb510f9c77067173b5421046d7c47815f45bce2bab81538f96bd4d284330143f05c1ffff924949f0427918e1fdee4a94ef9634de03540c0936529eb256fc0ad605e97125665307df52500b1e628904321d4d8b0067ba9b483d1c82114bb6ad2879395852476f630805194c7b17ee4b8b9f621d788c6eba17369a15b24", 0xa2, 0x80}, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x1, 0x80, r0, &(0x7f0000000dc0)="9eca15fcab420a9fbce6357d548d3eb209218419af81acf7d3cccba87b73421f7e25e40b93e4eab01f19789c978cab4a2859", 0x32, 0x49e2, 0x0, 0x0, r9}]) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) r10 = dup3(r0, r1, 0x80000) shutdown(r1, 0x1) recvmsg(r10, &(0x7f00000006c0)={&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000100)=""/144, 0x90}, {&(0x7f00000001c0)=""/112, 0x70}, {&(0x7f0000000240)=""/74, 0x4a}, {&(0x7f00000002c0)=""/107, 0x6b}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/94, 0x5e}, {&(0x7f0000000500)=""/105, 0x69}], 0x8, &(0x7f0000000600)=""/156, 0x9c}, 0x101) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000740)={0xefd, 0x10, '\x00', 0x1, &(0x7f0000000700)=[0x0, 0x0]}) [ 1238.862578] loop4: detected capacity change from 0 to 164 13:37:25 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) write$tun(r3, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1e, 0xa, 0x1e9, &(0x7f00000003c0)}) r4 = getpid() pidfd_open(r4, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x5, 0x4e, 0x0, 0x0, 0x1b7, 0x20460, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x100000001, 0x7}, 0x608, 0x3ff, 0x9, 0x7, 0x4fcf, 0x80000000, 0x5, 0x0, 0x5, 0x0, 0x7fff}, r4, 0xb, 0xffffffffffffffff, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xa) ftruncate(r1, 0x7ff) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0xfffffffffffffffd) [ 1238.902865] loop2: detected capacity change from 0 to 4 [ 1238.918434] EXT4-fs (loop2): invalid inodes per group: 0 [ 1238.918434] 13:37:25 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x40087602, &(0x7f0000000000)={0x1000}) 13:37:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 65) 13:37:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000004580)=""/124) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000004600)={0x0, 0x80, 0x2, 0x7f, 0x3, 0xff, 0x0, 0x9, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x6b6, 0xd0c7}, 0x1000, 0x6, 0xffff, 0x3, 0x7ff, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x800}, 0x0, 0xb, r2, 0xa) clock_gettime(0x0, &(0x7f0000004100)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000040), 0x6e, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/118, 0x76}, {&(0x7f0000000140)=""/18, 0x12}, {&(0x7f0000000180)=""/38, 0x26}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000001c0)}, {&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000000240)=""/88, 0x58}, {&(0x7f00000013c0)=""/210, 0xd2}], 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="18001000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x70}}, {{&(0x7f0000001540), 0x6e, &(0x7f00000016c0)=[{&(0x7f00000015c0)=""/239, 0xef}], 0x1}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000002c40)=[{&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/174, 0xae}, {&(0x7f0000002840)=""/245, 0xf5}, {&(0x7f0000002940)=""/253, 0xfd}, {&(0x7f0000002a40)=""/74, 0x4a}, {&(0x7f0000002ac0)=""/183, 0xb7}, {&(0x7f0000002b80)=""/176, 0xb0}], 0x7, &(0x7f0000002cc0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x138}}, {{0x0, 0x0, &(0x7f0000003fc0)=[{&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000003e00)=""/240, 0xf0}, {&(0x7f0000003f00)=""/148, 0x94}], 0x3}}], 0x4, 0x1, &(0x7f0000004140)={r3, r4+60000000}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, &(0x7f0000004540)={0x0, @adiantum, 0x0, @desc4}) 13:37:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x540e, &(0x7f0000000000)) 13:37:26 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) write$tun(r3, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1e, 0xa, 0x1e9, &(0x7f00000003c0)}) r4 = getpid() pidfd_open(r4, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x5, 0x4e, 0x0, 0x0, 0x1b7, 0x20460, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x100000001, 0x7}, 0x608, 0x3ff, 0x9, 0x7, 0x4fcf, 0x80000000, 0x5, 0x0, 0x5, 0x0, 0x7fff}, r4, 0xb, 0xffffffffffffffff, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xa) ftruncate(r1, 0x7ff) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0xfffffffffffffffd) [ 1239.016447] loop2: detected capacity change from 0 to 4 [ 1239.023201] FAULT_INJECTION: forcing a failure. [ 1239.023201] name failslab, interval 1, probability 0, space 0, times 0 [ 1239.024319] CPU: 0 UID: 0 PID: 10094 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1239.024335] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 13:37:26 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x401c5820, &(0x7f0000000000)={0x1000}) 13:37:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc0189436, &(0x7f0000000000)) 13:37:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80811501, &(0x7f0000000000)={0x1000}) [ 1239.024342] Call Trace: [ 1239.024346] [ 1239.024351] dump_stack_lvl+0xfa/0x120 [ 1239.024375] should_fail_ex+0x4d7/0x5e0 [ 1239.024391] should_failslab+0xc2/0x120 [ 1239.024410] __kmalloc_noprof+0xc8/0x760 [ 1239.024422] ? __pfx_perf_trace_lock+0x10/0x10 [ 1239.024438] ? find_held_lock+0x2b/0x80 [ 1239.024456] ? ext4_find_extent+0x7f5/0xa00 [ 1239.024476] ? ext4_find_extent+0x7f5/0xa00 [ 1239.024486] ext4_find_extent+0x7f5/0xa00 [ 1239.024501] ext4_ext_map_blocks+0x1cc/0x5f70 [ 1239.024517] ? find_held_lock+0x2b/0x80 [ 1239.024537] ? mark_held_locks+0x49/0x80 [ 1239.024553] ? finish_task_switch.isra.0+0x206/0x840 [ 1239.024576] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1239.024587] ? __schedule+0xe91/0x3580 [ 1239.024607] ? look_up_lock_class+0x56/0x150 [ 1239.024625] ? register_lock_class+0x41/0x560 [ 1239.024642] ? __lock_acquire+0xc65/0x1b70 [ 1239.024663] ? lock_acquire+0x15e/0x2f0 [ 1239.024676] ? ext4_map_blocks+0x49f/0x14a0 [ 1239.024695] ext4_map_query_blocks+0x117/0x890 [ 1239.024710] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 1239.024724] ? __pfx_down_read+0x10/0x10 [ 1239.024742] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1239.024762] ext4_map_blocks+0x4b3/0x14a0 [ 1239.024782] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1239.024796] ? __pfx_ext4_initxattrs+0x10/0x10 [ 1239.024810] ? __pfx_security_inode_init_security+0x10/0x10 [ 1239.024831] ? crc32c+0x1ae/0x350 [ 1239.024849] ? __brelse+0x7f/0xa0 [ 1239.024863] ? __ext4_new_inode+0x116/0x4d70 [ 1239.024883] ext4_append+0x1b6/0x530 [ 1239.024903] ? __pfx_ext4_append+0x10/0x10 [ 1239.024921] ? __pfx___ext4_new_inode+0x10/0x10 [ 1239.024943] ext4_init_new_dir+0x13c/0x240 [ 1239.024955] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1239.024974] ext4_mkdir+0x3c5/0xb30 [ 1239.024989] ? __pfx_ext4_mkdir+0x10/0x10 [ 1239.025001] ? security_inode_permission+0x72/0xe0 [ 1239.025019] vfs_mkdir+0x59a/0x8d0 [ 1239.025035] do_mkdirat+0x19f/0x3d0 [ 1239.025052] ? __pfx_do_mkdirat+0x10/0x10 [ 1239.025074] __x64_sys_mkdir+0xf3/0x140 [ 1239.025091] do_syscall_64+0xbf/0x390 [ 1239.025111] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1239.025124] RIP: 0033:0x7efc34338c27 [ 1239.025133] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1239.025145] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1239.025156] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1239.025164] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1239.025171] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1239.025179] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1239.025186] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1239.025204] 13:37:26 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) write$tun(r3, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1e, 0xa, 0x1e9, &(0x7f00000003c0)}) r4 = getpid() pidfd_open(r4, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x5, 0x4e, 0x0, 0x0, 0x1b7, 0x20460, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x100000001, 0x7}, 0x608, 0x3ff, 0x9, 0x7, 0x4fcf, 0x80000000, 0x5, 0x0, 0x5, 0x0, 0x7fff}, r4, 0xb, 0xffffffffffffffff, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0xa) ftruncate(r1, 0x7ff) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0xfffffffffffffffd) 13:37:26 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4020940d, &(0x7f0000000000)={0x1000}) 13:37:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 66) 13:37:26 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) write$tun(r2, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1e, 0xa, 0x1e9, &(0x7f00000003c0)}) r3 = getpid() pidfd_open(r3, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x5, 0x4e, 0x0, 0x0, 0x1b7, 0x20460, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x100000001, 0x7}, 0x608, 0x3ff, 0x9, 0x7, 0x4fcf, 0x80000000, 0x5, 0x0, 0x5, 0x0, 0x7fff}, r3, 0xb, 0xffffffffffffffff, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xa) r5 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r5, 0x560a, 0xfffffffffffffffd) 13:37:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x540f, &(0x7f0000000000)) 13:37:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc0045878, &(0x7f0000000000)={0x1000}) [ 1239.219039] loop2: detected capacity change from 0 to 4 [ 1239.224973] EXT4-fs (loop2): invalid inodes per group: 0 [ 1239.224973] [ 1239.694448] loop4: detected capacity change from 0 to 164 13:37:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 67) 13:37:26 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80045432, &(0x7f0000000000)={0x1000}) 13:37:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc020660b, &(0x7f0000000000)) 13:37:26 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) write$tun(r2, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1e, 0xa, 0x1e9, &(0x7f00000003c0)}) r3 = getpid() pidfd_open(r3, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x5, 0x4e, 0x0, 0x0, 0x1b7, 0x20460, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x100000001, 0x7}, 0x608, 0x3ff, 0x9, 0x7, 0x4fcf, 0x80000000, 0x5, 0x0, 0x5, 0x0, 0x7fff}, r3, 0xb, 0xffffffffffffffff, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) pipe(&(0x7f0000000140)) r4 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r4, 0x560a, 0xfffffffffffffffd) [ 1239.747449] loop2: detected capacity change from 0 to 4 [ 1239.753381] EXT4-fs (loop2): invalid inodes per group: 0 [ 1239.753381] [ 1241.834194] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 1241.837393] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 1241.840305] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 1241.856074] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 1241.860756] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 1243.924877] Bluetooth: hci6: command tx timeout [ 1245.973095] Bluetooth: hci6: command tx timeout [ 1248.021959] Bluetooth: hci6: command tx timeout [ 1250.068624] Bluetooth: hci6: command tx timeout [ 1258.963642] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1258.964937] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1259.061420] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1259.063126] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1260.949001] Bluetooth: hci1: command 0x0405 tx timeout 13:37:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) connect$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x1, @none, 0x3}, 0xe) shutdown(r0, 0x1) 13:37:56 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0xfd, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:37:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 68) 13:37:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:37:56 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80045440, &(0x7f0000000000)={0x1000}) 13:37:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc0045878, &(0x7f0000000000)={0x1000}) 13:37:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5410, &(0x7f0000000000)) 13:37:56 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) write$tun(r2, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1e, 0xa, 0x1e9, &(0x7f00000003c0)}) r3 = getpid() pidfd_open(r3, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x5, 0x4e, 0x0, 0x0, 0x1b7, 0x20460, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x100000001, 0x7}, 0x608, 0x3ff, 0x9, 0x7, 0x4fcf, 0x80000000, 0x5, 0x0, 0x5, 0x0, 0x7fff}, r3, 0xb, 0xffffffffffffffff, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r4 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r4, 0x560a, 0xfffffffffffffffd) [ 1269.313985] loop2: detected capacity change from 0 to 4 [ 1269.319866] FAULT_INJECTION: forcing a failure. [ 1269.319866] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.321957] CPU: 0 UID: 0 PID: 10611 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1269.321988] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.322002] Call Trace: [ 1269.322010] [ 1269.322019] dump_stack_lvl+0xfa/0x120 [ 1269.322062] should_fail_ex+0x4d7/0x5e0 [ 1269.322092] should_failslab+0xc2/0x120 [ 1269.322128] __kmalloc_noprof+0xc8/0x760 [ 1269.322155] ? ext4_find_extent+0x7f5/0xa00 [ 1269.322185] ? ext4_find_extent+0x7f5/0xa00 [ 1269.322205] ext4_find_extent+0x7f5/0xa00 [ 1269.322235] ext4_ext_map_blocks+0x1cc/0x5f70 [ 1269.322274] ? lock_acquire+0x15e/0x2f0 [ 1269.322302] ? fs_reclaim_acquire+0xae/0x150 [ 1269.322336] ? lock_is_held_type+0x9e/0x120 [ 1269.322378] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1269.322418] ? lock_acquire+0x15e/0x2f0 [ 1269.322445] ? ext4_map_blocks+0x55b/0x14a0 [ 1269.322498] ? down_write+0x119/0x1f0 [ 1269.322534] ? __pfx_down_write+0x10/0x10 [ 1269.322580] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1269.322619] ext4_map_blocks+0x624/0x14a0 [ 1269.322656] ? __up_read+0x197/0x750 [ 1269.322688] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1269.322718] ? __pfx___up_read+0x10/0x10 [ 1269.322752] ? lock_release+0xc8/0x290 [ 1269.322787] ? ext4_map_blocks+0x1e0/0x14a0 [ 1269.322827] ext4_getblk+0x682/0x8e0 [ 1269.322859] ? __pfx_ext4_getblk+0x10/0x10 [ 1269.322887] ? __pfx_security_inode_init_security+0x10/0x10 [ 1269.322930] ? crc32c+0x1ae/0x350 [ 1269.322972] ext4_bread+0x2e/0x1a0 [ 1269.323005] ext4_append+0x224/0x530 [ 1269.323044] ? __pfx_ext4_append+0x10/0x10 [ 1269.323081] ? __pfx___ext4_new_inode+0x10/0x10 [ 1269.323127] ext4_init_new_dir+0x13c/0x240 [ 1269.323151] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1269.323187] ext4_mkdir+0x3c5/0xb30 [ 1269.323219] ? __pfx_ext4_mkdir+0x10/0x10 [ 1269.323242] ? security_inode_permission+0x72/0xe0 [ 1269.323277] vfs_mkdir+0x59a/0x8d0 [ 1269.323310] do_mkdirat+0x19f/0x3d0 [ 1269.323345] ? __pfx_do_mkdirat+0x10/0x10 [ 1269.323389] __x64_sys_mkdir+0xf3/0x140 [ 1269.323422] do_syscall_64+0xbf/0x390 [ 1269.323462] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1269.323486] RIP: 0033:0x7efc34338c27 [ 1269.323504] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.323525] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1269.323548] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1269.323563] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1269.323577] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1269.323591] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1269.323605] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1269.323641] 13:38:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 69) 13:38:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc0189436, &(0x7f0000000000)={0x1000}) 13:38:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x80402, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x2, 0x6, 0x84, 0x0, 0x0, 0x7, 0x4180, 0x9, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x2, @perf_config_ext={0x3ff, 0x7f}, 0x404, 0x4, 0x100, 0x9, 0xffffffffffffff80, 0xfffffff9, 0x8, 0x0, 0xff, 0x0, 0x4}, 0xffffffffffffffff, 0x7, r1, 0x0) shutdown(r0, 0x1) 13:38:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000040)) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8001, &(0x7f0000000000)=0xffffffff, 0x202, 0x0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:38:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80086601, &(0x7f0000000000)={0x1000}) 13:38:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5412, &(0x7f0000000000)) 13:38:07 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) write$tun(r1, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1e, 0xa, 0x1e9, &(0x7f00000003c0)}) r2 = getpid() pidfd_open(r2, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x5, 0x4e, 0x0, 0x0, 0x1b7, 0x20460, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x100000001, 0x7}, 0x608, 0x3ff, 0x9, 0x7, 0x4fcf, 0x80000000, 0x5, 0x0, 0x5, 0x0, 0x7fff}, r2, 0xb, 0xffffffffffffffff, 0x8) r3 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r3, 0x560a, 0xfffffffffffffffd) 13:38:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x5e4}) 13:38:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0xe405}) [ 1280.411669] loop2: detected capacity change from 0 to 4 [ 1280.420127] FAULT_INJECTION: forcing a failure. [ 1280.420127] name failslab, interval 1, probability 0, space 0, times 0 [ 1280.421803] CPU: 0 UID: 0 PID: 10633 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1280.421832] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1280.421844] Call Trace: [ 1280.421851] [ 1280.421860] dump_stack_lvl+0xfa/0x120 [ 1280.421900] should_fail_ex+0x4d7/0x5e0 [ 1280.421926] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 1280.421956] should_failslab+0xc2/0x120 [ 1280.421988] kmem_cache_alloc_noprof+0x72/0x680 [ 1280.422011] ? do_raw_spin_unlock+0x53/0x220 [ 1280.422052] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 1280.422079] ext4_mb_new_blocks+0x64e/0x45b0 [ 1280.422119] ? kasan_save_track+0x14/0x30 [ 1280.422150] ? __kasan_kmalloc+0x7f/0x90 [ 1280.422182] ? trace_kmalloc+0x1f/0xb0 [ 1280.422210] ? __kmalloc_noprof+0x2c9/0x760 [ 1280.422234] ? ext4_find_extent+0x7f5/0xa00 [ 1280.422254] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 1280.422285] ? ext4_ext_search_right+0x2e8/0xbd0 [ 1280.422319] ? ext4_inode_to_goal_block+0x323/0x430 [ 1280.422357] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 1280.422392] ? lock_acquire+0x15e/0x2f0 [ 1280.422416] ? fs_reclaim_acquire+0xae/0x150 [ 1280.422447] ? lock_is_held_type+0x9e/0x120 [ 1280.422492] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1280.422530] ? lock_acquire+0x15e/0x2f0 [ 1280.422554] ? ext4_map_blocks+0x55b/0x14a0 [ 1280.422597] ? __pfx_down_write+0x10/0x10 [ 1280.422628] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1280.422663] ext4_map_blocks+0x624/0x14a0 [ 1280.422709] ? __up_read+0x197/0x750 [ 1280.422737] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1280.422764] ? __pfx___up_read+0x10/0x10 [ 1280.422796] ? lock_release+0xc8/0x290 [ 1280.422828] ? ext4_map_blocks+0x1e0/0x14a0 [ 1280.422864] ext4_getblk+0x682/0x8e0 [ 1280.422894] ? __pfx_ext4_getblk+0x10/0x10 [ 1280.422919] ? __pfx_security_inode_init_security+0x10/0x10 [ 1280.422957] ? crc32c+0x1ae/0x350 [ 1280.422996] ext4_bread+0x2e/0x1a0 [ 1280.423026] ext4_append+0x224/0x530 [ 1280.423061] ? __pfx_ext4_append+0x10/0x10 [ 1280.423095] ? __pfx___ext4_new_inode+0x10/0x10 [ 1280.423136] ext4_init_new_dir+0x13c/0x240 [ 1280.423158] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1280.423192] ext4_mkdir+0x3c5/0xb30 [ 1280.423221] ? __pfx_ext4_mkdir+0x10/0x10 [ 1280.423242] ? security_inode_permission+0x72/0xe0 [ 1280.423274] vfs_mkdir+0x59a/0x8d0 [ 1280.423304] do_mkdirat+0x19f/0x3d0 [ 1280.423335] ? __pfx_do_mkdirat+0x10/0x10 [ 1280.423376] __x64_sys_mkdir+0xf3/0x140 [ 1280.423406] do_syscall_64+0xbf/0x390 [ 1280.423442] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1280.423464] RIP: 0033:0x7efc34338c27 [ 1280.423481] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1280.423501] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1280.423522] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1280.423536] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1280.423549] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1280.423562] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1280.423575] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1280.423609] 13:38:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0xd0e8ba75e46ce8e2, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000040)={0x0, 0x5, 0x2, 0x0, 0x0, [{{r0}, 0x4d}, {{r0}, 0x9}]}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:38:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5413, &(0x7f0000000000)) 13:38:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc020660b, &(0x7f0000000000)={0x1000}) 13:38:07 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) write$tun(r1, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1e, 0xa, 0x1e9, &(0x7f00000003c0)}) r2 = getpid() pidfd_open(r2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r3, 0x560a, 0xfffffffffffffffd) 13:38:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80087601, &(0x7f0000000000)={0x1000}) 13:38:17 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x3f, 0x7f, 0x7, 0x6, 0x0, 0x1, 0x20287, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x1000, 0x20}, 0x60, 0x2, 0x5, 0x4, 0x6, 0x6b, 0x1, 0x0, 0x81, 0x0, 0x5}, 0xffffffffffffffff, 0xd, r1, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:38:17 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0xe0ffff}) 13:38:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 70) 13:38:17 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5414, &(0x7f0000000000)) 13:38:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x3e8}) 13:38:17 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) write$tun(r1, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1e, 0xa, 0x1e9, &(0x7f00000003c0)}) getpid() r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r2, 0x560a, 0xfffffffffffffffd) 13:38:17 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80111500, &(0x7f0000000000)={0x1000}) 13:38:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x401, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x1f, 0x1}, 0xe) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) shutdown(r1, 0x1) [ 1290.101331] loop2: detected capacity change from 0 to 4 [ 1290.133611] EXT4-fs (loop2): invalid inodes per group: 0 [ 1290.133611] 13:38:17 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) write$tun(r1, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x1e, 0xa, 0x1e9, &(0x7f00000003c0)}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r2, 0x560a, 0xfffffffffffffffd) 13:38:17 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:38:17 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5415, &(0x7f0000000000)) 13:38:17 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x1000000}) 13:38:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:38:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 71) 13:38:17 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x801c581f, &(0x7f0000000000)={0x1000}) [ 1290.344379] loop2: detected capacity change from 0 to 4 [ 1290.352156] FAULT_INJECTION: forcing a failure. [ 1290.352156] name failslab, interval 1, probability 0, space 0, times 0 [ 1290.353977] CPU: 0 UID: 0 PID: 10698 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1290.354006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1290.354018] Call Trace: [ 1290.354025] [ 1290.354033] dump_stack_lvl+0xfa/0x120 [ 1290.354073] should_fail_ex+0x4d7/0x5e0 [ 1290.354099] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 1290.354129] should_failslab+0xc2/0x120 [ 1290.354160] kmem_cache_alloc_noprof+0x72/0x680 [ 1290.354194] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 1290.354221] ext4_mb_new_blocks+0x2414/0x45b0 [ 1290.354258] ? kasan_save_track+0x14/0x30 [ 1290.354290] ? __kasan_kmalloc+0x7f/0x90 [ 1290.354320] ? trace_kmalloc+0x1f/0xb0 [ 1290.354348] ? __kmalloc_noprof+0x2c9/0x760 [ 1290.354371] ? ext4_find_extent+0x7f5/0xa00 [ 1290.354390] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 1290.354421] ? ext4_ext_search_right+0x2e8/0xbd0 [ 1290.354453] ? ext4_inode_to_goal_block+0x323/0x430 [ 1290.354499] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 1290.354533] ? lock_acquire+0x15e/0x2f0 [ 1290.354558] ? fs_reclaim_acquire+0xae/0x150 [ 1290.354588] ? lock_is_held_type+0x9e/0x120 [ 1290.354625] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1290.354661] ? lock_acquire+0x15e/0x2f0 [ 1290.354684] ? ext4_map_blocks+0x55b/0x14a0 [ 1290.354726] ? __pfx_down_write+0x10/0x10 [ 1290.354757] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1290.354807] ext4_map_blocks+0x624/0x14a0 [ 1290.354840] ? __up_read+0x197/0x750 [ 1290.354867] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1290.354893] ? __pfx___up_read+0x10/0x10 [ 1290.354923] ? lock_release+0xc8/0x290 [ 1290.354953] ? ext4_map_blocks+0x1e0/0x14a0 [ 1290.354987] ext4_getblk+0x682/0x8e0 [ 1290.355016] ? __pfx_ext4_getblk+0x10/0x10 [ 1290.355040] ? __pfx_security_inode_init_security+0x10/0x10 [ 1290.355078] ? crc32c+0x1ae/0x350 [ 1290.355114] ext4_bread+0x2e/0x1a0 [ 1290.355142] ext4_append+0x224/0x530 [ 1290.355176] ? __pfx_ext4_append+0x10/0x10 [ 1290.355208] ? __pfx___ext4_new_inode+0x10/0x10 [ 1290.355248] ext4_init_new_dir+0x13c/0x240 [ 1290.355269] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1290.355301] ext4_mkdir+0x3c5/0xb30 [ 1290.355329] ? __pfx_ext4_mkdir+0x10/0x10 [ 1290.355349] ? security_inode_permission+0x72/0xe0 [ 1290.355380] vfs_mkdir+0x59a/0x8d0 [ 1290.355408] do_mkdirat+0x19f/0x3d0 [ 1290.355438] ? __pfx_do_mkdirat+0x10/0x10 [ 1290.355476] __x64_sys_mkdir+0xf3/0x140 [ 1290.355505] do_syscall_64+0xbf/0x390 [ 1290.355540] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1290.355562] RIP: 0033:0x7efc34338c27 [ 1290.355578] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1290.355597] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1290.355617] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1290.355631] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1290.355643] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1290.355656] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1290.355668] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1290.355700] 13:38:17 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x80811501, &(0x7f0000000000)={0x1000}) 13:38:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000, 0x4}) 13:38:17 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5416, &(0x7f0000000000)) 13:38:17 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0xe4050000}) 13:38:17 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) write$tun(r0, &(0x7f0000000180)={@void, @void, @mpls={[{0x7, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x2}, {0x200}, {0x200}], @generic="278549110334c3612a9445f0b0e24bb2ba0a8eefb82eb13c7921f598261646c623a30b55b6ef857c4bb922805547d6b516ac542f2e90590d79ce7b4afbba206b7742671d293fb2220a0d286d8ac7093118b30a3ab0f4b5a0d72a488ddd9636e114a2d161dcc5a97e223679a198fe9f641cbc910fa6"}}, 0x89) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r1, 0x560a, 0xfffffffffffffffd) 13:38:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5418, &(0x7f0000000000)) 13:38:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) shutdown(r0, 0x1) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000100)={0x7, 'syz_tun\x00', {0x19c}, 0xa9cc}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 13:38:27 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0xffffe000}) 13:38:27 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc0045878, &(0x7f0000000000)={0x1000}) 13:38:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000, 0x8}) 13:38:27 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r1, 0x560a, 0xfffffffffffffffd) 13:38:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 72) 13:38:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r1, 0x40049366, &(0x7f0000000040)=0x2) [ 1300.189204] loop2: detected capacity change from 0 to 4 13:38:27 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc0045878, &(0x7f0000000000)={0x1000}) 13:38:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0x4008, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) read(r2, &(0x7f0000000180)=""/109, 0x6d) write(r1, &(0x7f0000000080)="6e3bc4df0fc76da3c511c886da60e7f5cfad85288c65b820dcf5e9746441ed6182c67acab7b75a8d307e", 0x2a) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) [ 1300.237077] EXT4-fs (loop2): invalid inodes per group: 0 [ 1300.237077] 13:38:27 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:38:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x541b, &(0x7f0000000000)) 13:38:27 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r0, 0x560a, 0xfffffffffffffffd) 13:38:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:38:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x7fff, &(0x7f00000000c0)=0x2) shutdown(r0, 0x1) 13:38:37 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc0189436, &(0x7f0000000000)={0x1000}) 13:38:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000, 0x10}) 13:38:37 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/hid_a4tech', 0x200000, 0x68) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r0, 0x560a, 0xfffffffffffffffd) 13:38:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x541d, &(0x7f0000000000)) 13:38:37 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x0, 0x5e4}) 13:38:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 73) 13:38:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000, 0x40000}) 13:38:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54dc5d06bb604a35, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$TIOCCBRK(r0, 0x5428) [ 1310.325091] loop2: detected capacity change from 0 to 4 13:38:37 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x0, 0xe405}) 13:38:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000, 0x80000}) 13:38:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x541e, &(0x7f0000000000)) [ 1310.366242] FAULT_INJECTION: forcing a failure. [ 1310.366242] name failslab, interval 1, probability 0, space 0, times 0 [ 1310.367417] CPU: 1 UID: 0 PID: 10782 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1310.367433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1310.367440] Call Trace: [ 1310.367445] [ 1310.367450] dump_stack_lvl+0xfa/0x120 [ 1310.367478] should_fail_ex+0x4d7/0x5e0 [ 1310.367490] ? __es_remove_extent+0x53f/0x1570 [ 1310.367508] ? __es_insert_extent+0xed2/0x1370 [ 1310.367519] should_failslab+0xc2/0x120 [ 1310.367538] kmem_cache_alloc_noprof+0x72/0x680 [ 1310.367553] ? __pfx___es_remove_extent+0x10/0x10 [ 1310.367570] ? __es_insert_extent+0xed2/0x1370 [ 1310.367583] __es_insert_extent+0xed2/0x1370 [ 1310.367605] ext4_es_insert_extent+0x4d0/0x1100 [ 1310.367625] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 1310.367639] ? lock_acquire+0x15e/0x2f0 [ 1310.367654] ? ext4_map_blocks+0x55b/0x14a0 [ 1310.367678] ? __pfx_down_write+0x10/0x10 [ 1310.367697] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1310.367716] ext4_map_blocks+0x7ff/0x14a0 [ 1310.367734] ? __up_read+0x197/0x750 [ 1310.367749] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1310.367764] ? __pfx___up_read+0x10/0x10 [ 1310.367781] ? lock_release+0xc8/0x290 [ 1310.367799] ? ext4_map_blocks+0x1e0/0x14a0 [ 1310.367818] ext4_getblk+0x682/0x8e0 [ 1310.367835] ? __pfx_ext4_getblk+0x10/0x10 [ 1310.367848] ? __pfx_security_inode_init_security+0x10/0x10 [ 1310.367870] ? crc32c+0x1ae/0x350 [ 1310.367891] ext4_bread+0x2e/0x1a0 [ 1310.367907] ext4_append+0x224/0x530 [ 1310.367927] ? __pfx_ext4_append+0x10/0x10 [ 1310.367945] ? __pfx___ext4_new_inode+0x10/0x10 [ 1310.367968] ext4_init_new_dir+0x13c/0x240 [ 1310.367979] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1310.367998] ext4_mkdir+0x3c5/0xb30 [ 1310.368014] ? __pfx_ext4_mkdir+0x10/0x10 [ 1310.368025] ? security_inode_permission+0x72/0xe0 [ 1310.368043] vfs_mkdir+0x59a/0x8d0 [ 1310.368059] do_mkdirat+0x19f/0x3d0 [ 1310.368076] ? __pfx_do_mkdirat+0x10/0x10 [ 1310.368098] __x64_sys_mkdir+0xf3/0x140 [ 1310.368114] do_syscall_64+0xbf/0x390 [ 1310.368135] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1310.368147] RIP: 0033:0x7efc34338c27 [ 1310.368156] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1310.368168] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1310.368179] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1310.368187] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1310.368194] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1310.368201] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1310.368208] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1310.368229] 13:38:37 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0xc020660b, &(0x7f0000000000)={0x1000}) 13:38:37 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r0, 0x560a, 0xfffffffffffffffd) [ 1310.416428] EXT4-fs (loop2): invalid inodes per group: 0 [ 1310.416428] 13:38:37 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x0, 0xe0ffff}) 13:38:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000, 0x100000}) 13:38:47 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r0, 0x560a, 0xfffffffffffffffd) 13:38:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x5, &(0x7f00000002c0)=[{&(0x7f0000000180)="63b3a057096d1fc03166f9e4dcb953b751e41cc99b8fd04c", 0x18, 0xfffffffffffffff8}, {&(0x7f00000001c0)="34452ba55f20fb2eba53032d", 0xc, 0x4}, {&(0x7f0000000200)="a39ac23dedc27e71ace27096832e52f01432f6be6c73d27fd08e64efed14828b61", 0x21, 0x5}, {&(0x7f0000000240)="b7d760fd53d4289080c8116c0c1f706fbc3a50596a5f1260aef97421f421616169412ce67301f054697e65f7b72847d1b6c1d53b0eaa30e159ce5db0b74b7d8b456c9c3de6b45d714d097f135d76b0bba3b3a9ee5453eb1be5ebe95582133f3a0af35036f5e12d8ab66eba6a1a9a58106b2a28db96b8824a9f", 0x79, 0x7f}, {&(0x7f00000003c0)="75b4cb2ce696b75cf5497beba0091924425e8f6708ff88de4ee500bad54c16c4bd0e4230377d99c61a4e1e250fcdc5051a042778b8fca18b961f682a4c436dcc4d0efa8e7327a481da1f79c44129913af50397173a57b28f81f35690dbaf2254b1249d31c46d141bac78e7d5cfddd468cab7433bb1fc83586018f1daff911b427612cccd99d56e077759b3d7f09d9ef25f6dd807b4f32df32b726651fd5ca4190072dd7091903e4bd29d1e55faefebaebfecea05b535ab616a21008769d4bbf648fbe07b14b57bedce229862fb36ef866a1bdb59dc87df89cd5f2224e45380b57c2fc8b53ae1eb937112e1e7cc5f", 0xee, 0x3}], 0x98, &(0x7f00000004c0)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x7fff}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4e9}}, {@data_ordered}, {@i_version}], [{@dont_measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x39, 0x61, 0x56, 0x64, 0x33, 0x34, 0x63], 0x2d, [0x35, 0x34, 0x30, 0x65], 0x2d, [0x61, 0x34, 0x32, 0x68], 0x2d, [0x65, 0x32, 0x33, 0x32], 0x2d, [0x31, 0x32, 0x63, 0x35, 0x34, 0x0, 0x39]}}}, {@smackfsdef}, {@dont_measure}, {@fsname={'fsname', 0x3d, '+'}}, {@smackfshat={'smackfshat', 0x3d, '{-\\'}}, {@subj_role={'subj_role', 0x3d, '&&[$,,%'}}]}) fcntl$setpipe(r1, 0x407, 0x3) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:38:47 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x0, 0x1000000}) 13:38:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x541e, &(0x7f0000000000)) 13:38:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 74) 13:38:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000, 0x1000000}) 13:38:47 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:38:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x6, @none, 0x0, 0x2}, 0xe) [ 1320.407547] loop2: detected capacity change from 0 to 4 [ 1320.429270] EXT4-fs (loop2): invalid inodes per group: 0 [ 1320.429270] 13:38:47 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x0, 0xe4050000}) 13:38:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5421, &(0x7f0000000000)) 13:38:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000, 0xfdfdffff}) 13:38:47 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000, 0x1000000}) 13:38:47 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$VT_RESIZEX(r0, 0x560a, 0xfffffffffffffffd) 13:38:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 75) 13:38:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x6f0880, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) write(0xffffffffffffffff, &(0x7f0000000240)="6aeab968761e4a05ec0209e5d62108f8d75bf7ee838a2b37872b4b152b3c785eea4bba96ed958f7bfa436657de70742bac52f2dbe854e1e6ebfc5c194b0f8e84be41d16c6d3421ad3c16077ddcf6c4ac4cac7733d674c522345245ad36089cdc0e1750ad3cdd0000000000", 0x6b) ioctl$PTP_PIN_SETFUNC2(r2, 0x40603d10, &(0x7f00000001c0)={'\x00', 0x1ff, 0x3, 0x10000}) close(r2) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f0000000180)={0x2, 0x1, 0x1e, 0x9, 0x184, &(0x7f00000007c0)="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"}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0xfd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x92f06, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x301002, 0x0) readv(r3, &(0x7f0000000c40)=[{&(0x7f00000002c0)=""/55}, {&(0x7f0000000300)=""/6}, {&(0x7f0000000bc0)=""/2}], 0xa) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000000140)={0x1, 0x1, 0x6, 0xb, 0x1ce, &(0x7f00000003c0)}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000003240)='/sys/module/e100', 0x4081, 0x112) read(r4, &(0x7f0000000040)=""/102, 0x66) ioctl$F2FS_IOC_DEFRAGMENT(r4, 0xc010f508, &(0x7f0000000040)={0x5, 0x8}) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r5, 0x84009422, &(0x7f0000000c80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 1320.666027] loop2: detected capacity change from 0 to 4 [ 1320.677058] FAULT_INJECTION: forcing a failure. [ 1320.677058] name failslab, interval 1, probability 0, space 0, times 0 [ 1320.679217] CPU: 0 UID: 0 PID: 10842 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1320.679262] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1320.679280] Call Trace: [ 1320.679292] [ 1320.679305] dump_stack_lvl+0xfa/0x120 [ 1320.679364] should_fail_ex+0x4d7/0x5e0 [ 1320.679405] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 1320.679451] should_failslab+0xc2/0x120 [ 1320.679513] kmem_cache_alloc_noprof+0x72/0x680 [ 1320.679571] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 1320.679616] ext4_mb_new_blocks+0x2414/0x45b0 [ 1320.679683] ? kasan_save_track+0x14/0x30 [ 1320.679735] ? __kasan_kmalloc+0x7f/0x90 [ 1320.679787] ? trace_kmalloc+0x1f/0xb0 [ 1320.679832] ? __kmalloc_noprof+0x2c9/0x760 [ 1320.679870] ? ext4_find_extent+0x7f5/0xa00 [ 1320.679903] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 1320.679954] ? ext4_ext_search_right+0x2e8/0xbd0 [ 1320.680008] ? ext4_inode_to_goal_block+0x323/0x430 [ 1320.680072] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 1320.680133] ? lock_acquire+0x15e/0x2f0 [ 1320.680174] ? fs_reclaim_acquire+0xae/0x150 [ 1320.680225] ? lock_is_held_type+0x9e/0x120 [ 1320.680286] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1320.680348] ? lock_acquire+0x15e/0x2f0 [ 1320.680385] ? ext4_map_blocks+0x55b/0x14a0 [ 1320.680455] ? __pfx_down_write+0x10/0x10 [ 1320.680505] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1320.680563] ext4_map_blocks+0x624/0x14a0 [ 1320.680618] ? __up_read+0x197/0x750 [ 1320.680660] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1320.680704] ? __pfx___up_read+0x10/0x10 [ 1320.680754] ? lock_release+0xc8/0x290 [ 1320.680808] ? ext4_map_blocks+0x1e0/0x14a0 [ 1320.680868] ext4_getblk+0x682/0x8e0 [ 1320.680917] ? __pfx_ext4_getblk+0x10/0x10 [ 1320.680956] ? __pfx_security_inode_init_security+0x10/0x10 [ 1320.681020] ? crc32c+0x1ae/0x350 [ 1320.681083] ext4_bread+0x2e/0x1a0 [ 1320.681133] ext4_append+0x224/0x530 [ 1320.681190] ? __pfx_ext4_append+0x10/0x10 [ 1320.681246] ? __pfx___ext4_new_inode+0x10/0x10 [ 1320.681316] ext4_init_new_dir+0x13c/0x240 [ 1320.681350] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1320.681402] ext4_mkdir+0x3c5/0xb30 [ 1320.681451] ? __pfx_ext4_mkdir+0x10/0x10 [ 1320.681486] ? security_inode_permission+0x72/0xe0 [ 1320.681538] vfs_mkdir+0x59a/0x8d0 [ 1320.681594] do_mkdirat+0x19f/0x3d0 [ 1320.681646] ? __pfx_do_mkdirat+0x10/0x10 [ 1320.681715] __x64_sys_mkdir+0xf3/0x140 [ 1320.681765] do_syscall_64+0xbf/0x390 [ 1320.681823] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1320.681858] RIP: 0033:0x7efc34338c27 [ 1320.681883] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1320.681915] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1320.681947] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1320.681970] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1320.681991] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1320.682012] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1320.682032] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1320.682088] 13:38:58 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, 0xfffffffffffffffd) 13:38:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x0, 0xffffe000}) 13:38:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 76) 13:38:58 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6eb52dfd6dde555, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xa9c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000100)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) sendfile(r1, r3, &(0x7f0000000080), 0x5) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000040)={0xfffffffa, 0x951f, 0x5, 0x3, 0x11, "0dd8012216653f7bf8f17e84fecd151bfa7554"}) syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:38:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5422, &(0x7f0000000000)) 13:38:58 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="01000026d4ee8e6f03463c70", @ANYRES32=r0, @ANYBLOB="01000000000000002e2f66696c653000"]) close_range(r1, r2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000100)={r2, 0xfffffffffffffffb, 0x6, 0x6}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) r4 = memfd_secret(0x0) ioctl$KDGETKEYCODE(r4, 0x4b45, &(0x7f0000000140)={0x1000}) 13:38:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000, 0xfffffdfd}) 13:38:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000080)={0x0, 0x80, 0x8, 0x1, 0x6, 0x6, 0x0, 0x4, 0x10, 0xa, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffff801, 0x4, @perf_config_ext={0x800, 0xfffffffffffffffd}, 0x10004, 0x1, 0x10001, 0x4, 0x100000001, 0x2, 0x1, 0x0, 0x0, 0x0, 0x9}) [ 1331.835357] loop2: detected capacity change from 0 to 4 13:38:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x32f) 13:38:58 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0xfffffffffffffffd) [ 1331.864958] EXT4-fs (loop2): invalid inodes per group: 0 [ 1331.864958] 13:38:58 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) readahead(r1, 0x1, 0x3) 13:38:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0xe0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000080)={0x6, "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"}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:38:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 77) 13:38:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5423, &(0x7f0000000000)) 13:38:58 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext, 0x0, 0x2, 0x10000, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) writev(r2, &(0x7f0000001780)=[{&(0x7f0000000100)="b6a5f349a3b7d5ccba061891eb8dfaf1c4d7188a5cb43b64efa320cf83995513815bd62e2a370f191bb6eeebf52ee9fd3de47cf8abfce66c3fdaca588350877fd3211b964ab3003fa894bf1451bd59fbeed949fee35795b5", 0x58}, {&(0x7f0000000180)="a632d4f3613dd2ba5148b985dbeea8ebb594de176788e62ad543ab6e6f564bbf5a092cb19384c25731c10959ca1774d50515dd63860cd6b3890279b6cd4b5182d9887090960d6535a7f6db55762f2f168b01436839a14e1e00095ea8c2f0d7e0a9c0c37d222b1a264f69ebb5c53afe33a8fe1f41a0a6aaedb43cae7b491ca64183c66f1818e71fc9c8256834cbb7f36e602d5a90cba6b781f165f9f19996bea522a604f9e4cccd51f3f7a5", 0xab}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000240)="92ca2ded1be69be8a70f97e0df52a2a8fa37fd8d33aa4fa0c35a58de9d9506958cd5f9d9b31d1a954904087e", 0x2c}, {&(0x7f0000000280)="638b62eb61150bf6e641779d02a00349cb4f9064d9eac861aa8fae7a815c3d42eb8ef4825c521459cfd937770bb3a5dd942e2fac82ff1ed15da26e08cae0a883e1b574e3dc1ca082d0948f08664b1c4b5325a28522d3e9df73e570039f050a14cf5004f6736d764f73dc3fe8327a022e3f174ddcace511ba248291664ba37fc31dde1cd23a0e47971ad7d4afaf603b6658474e2fa06d854111f5ce3e4d119297a8", 0xa1}, {&(0x7f00000013c0)="bcf22bf83c06a1cf3e037e396ec0fcec7f36008b1cee6de4b1e1bbed49bfac2125251b3529f08962f07b064f5ddaf03ca2748e00e4b4f92f98e1955380eaf1c5387266f62b5426ea88547acea69d452d32f4debaae148443b388c1121930bc2a96972d2dc0a7757ee5f1b46760b0f03f4e343f8f82345f51633ff788ee1e3299c3afabf01d4d4990cd643603db8958a754473e0954a460077d1ae47e16cbcc359b37", 0xa2}, {&(0x7f0000001480)="bc2be940a2baded4baaf7a7b6fb41aa1f01744da081176b3c77dcb01771309d25c3c80256aaff41daaa6501d894d4a13fda5fe035e344d889f2dfadcbd356b98fba13c49fe7bb73240d2e933ab5b7716d9e2312431c88770af444ddc3ec91b377a254921b8d27f6970a9ee93d4040a01146b877da3a03e77a755145b3ac07acafc74e4437c0ccb09a0f393eaa332f51bbb2b7c3fcf7752dc9304b2084e7d3d9effb8e31f", 0xa4}, {&(0x7f0000001540)="3b38e6216c0595257a5fa14e7cfaf4b6e827e723c3cd7d3ee754d6992e44161413c71c6345b723e233f2c7f550c7b2bca2794389447aab0921a53f1679af28241bb84c1fb4aa4b94972de52a6f1f06defe1286e5dbff97dfccaefd3fa413217a0bebc4a5e8b8513636a8c4aa1944441d6937a6119086659a5c188d1ae5de51ddc5432c57b6cad9bd9881d6bedc62ad9a82112c03a332e21d244b74b0b1a83bc87cb84baffafb8e930d06036c1c", 0xad}, {&(0x7f0000001600)="6ca623ae06d32d2c0ba5e1487d407d1cad12346720c51e3c00a87dc54e2bcca1d06e671d5c0a2377e640fc9e0280d2e056c58402fa6df4e4fc5b62c088c23f29a926732ea1313a4ccdf06bdadd7b35d0992ac2a41f8d908e326d3e05", 0x5c}, {&(0x7f0000001680)="389699dba31498fdd22c1c2fdf52fa336277e513665ac458992d5538887aea3160d4c0e9428861ec4cd2bc54b7705616109693b6e5fdd37a90be1ad5d8f80e03a90f0c7d85921ba076e9be176d7eeaedad7c4340b9d9b9ba45f451f1b0c765263babc8165b3d16e511ddac27aa9bceaba5cd5a76f446d016e8cebc6af159dc6740fcf8ddf00661baf60be211a42213668824dab9814ae23b37c28552f2ca9627519348ede7e79be9334f39ef440fd6d057171c219e1dbaeecf1c23eabc518eb630e32bde36df33cff1983d29a32ffe1fea4c76bf85a6aa5537748c3f00fc36ce5a8083c060c030d98ce09e97acbe", 0xee}], 0xa) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) [ 1332.044407] loop2: detected capacity change from 0 to 4 [ 1332.047992] FAULT_INJECTION: forcing a failure. [ 1332.047992] name failslab, interval 1, probability 0, space 0, times 0 [ 1332.049010] CPU: 1 UID: 0 PID: 10889 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1332.049026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1332.049034] Call Trace: [ 1332.049038] [ 1332.049043] dump_stack_lvl+0xfa/0x120 [ 1332.049068] should_fail_ex+0x4d7/0x5e0 [ 1332.049080] ? __es_remove_extent+0x53f/0x1570 [ 1332.049099] ? __es_insert_extent+0xed2/0x1370 [ 1332.049114] should_failslab+0xc2/0x120 [ 1332.049132] kmem_cache_alloc_noprof+0x72/0x680 [ 1332.049146] ? __pfx___es_remove_extent+0x10/0x10 [ 1332.049163] ? __es_insert_extent+0xed2/0x1370 [ 1332.049176] __es_insert_extent+0xed2/0x1370 [ 1332.049198] ext4_es_insert_extent+0x4d0/0x1100 [ 1332.049218] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 1332.049232] ? lock_acquire+0x15e/0x2f0 [ 1332.049247] ? ext4_map_blocks+0x55b/0x14a0 [ 1332.049271] ? __pfx_down_write+0x10/0x10 [ 1332.049289] ? ext4_es_lookup_extent+0xc8/0xb30 [ 1332.049308] ext4_map_blocks+0x7ff/0x14a0 [ 1332.049326] ? __up_read+0x197/0x750 [ 1332.049342] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1332.049356] ? __pfx___up_read+0x10/0x10 [ 1332.049374] ? lock_release+0xc8/0x290 [ 1332.049391] ? ext4_map_blocks+0x1e0/0x14a0 [ 1332.049410] ext4_getblk+0x682/0x8e0 [ 1332.049426] ? __pfx_ext4_getblk+0x10/0x10 [ 1332.049440] ? __pfx_security_inode_init_security+0x10/0x10 [ 1332.049466] ? crc32c+0x1ae/0x350 [ 1332.049487] ext4_bread+0x2e/0x1a0 [ 1332.049503] ext4_append+0x224/0x530 [ 1332.049523] ? __pfx_ext4_append+0x10/0x10 [ 1332.049541] ? __pfx___ext4_new_inode+0x10/0x10 [ 1332.049564] ext4_init_new_dir+0x13c/0x240 [ 1332.049576] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 1332.049594] ext4_mkdir+0x3c5/0xb30 [ 1332.049610] ? __pfx_ext4_mkdir+0x10/0x10 [ 1332.049621] ? security_inode_permission+0x72/0xe0 [ 1332.049638] vfs_mkdir+0x59a/0x8d0 [ 1332.049655] do_mkdirat+0x19f/0x3d0 [ 1332.049672] ? __pfx_do_mkdirat+0x10/0x10 [ 1332.049694] __x64_sys_mkdir+0xf3/0x140 [ 1332.049710] do_syscall_64+0xbf/0x390 [ 1332.049730] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1332.049743] RIP: 0033:0x7efc34338c27 [ 1332.049752] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1332.049763] RSP: 002b:00007efc318aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1332.049775] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc34338c27 [ 1332.049783] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1332.049790] RBP: 00007efc318af040 R08: 0000000000000000 R09: ffffffffffffffff [ 1332.049797] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1332.049804] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1332.049822] [ 1332.079797] EXT4-fs (loop2): invalid inodes per group: 0 [ 1332.079797] 13:39:09 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0xfffffffffffffffd) 13:39:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000180)=""/221, 0xdd, 0x5) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000005, 0x12, r2, 0x0) r4 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) ioctl$FIBMAP(r4, 0x1, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/hid_pl', 0x400, 0x42) read(r5, &(0x7f0000000040)=""/102, 0x66) syz_memcpy_off$IO_URING_METADATA_FLAGS(r3, 0x118, &(0x7f0000000280), 0x0, 0x4) r6 = inotify_init() ioctl$EXT4_IOC_MIGRATE(r6, 0x6609) ioctl$TIOCGPTPEER(r5, 0x5441, 0x20) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:39:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x5e, @any, 0x2}, 0xe) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)={0x4000001d}) shutdown(r0, 0x1) 13:39:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5424, &(0x7f0000000000)) 13:39:09 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:39:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0xc000) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x0, 0x3}) 13:39:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 78) 13:39:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x315, 0x0, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xa2, 0x7f, 0x6, 0x5, 0x0, 0x9, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x5451, 0x8}, 0x10848, 0x0, 0x7, 0x4, 0x9, 0x9, 0x7f, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x9, 0xffffffffffffffff, 0x2) dup(r1) 13:39:09 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0xfffffffffffffffd) [ 1342.719717] loop2: detected capacity change from 0 to 4 13:39:09 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) [ 1342.735558] EXT4-fs (loop2): invalid inodes per group: 0 [ 1342.735558] 13:39:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5425, &(0x7f0000000000)) 13:39:09 executing program 3: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x0, 0x9}, 0x4, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b52, &(0x7f0000000000)={0x1000}) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x2, 0x20, 0x5, 0x5, 0x0, 0x40, 0x890, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000040), 0xc}, 0x40020, 0x0, 0x1, 0x5, 0x80, 0x10001, 0x101, 0x0, 0x2, 0x0, 0x80000001}, 0x0, 0x9, r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x80, 0x0) r2 = memfd_secret(0x80000) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x1f, 0x2, 0x2, 0x9, 0x0, 0x8, 0x1, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000100), 0xd}, 0x10020, 0x100000000, 0x8, 0x8, 0x7, 0xfff, 0x8, 0x0, 0x80000000, 0x0, 0x8f35}, r1, 0xffffffffffffffff, r2, 0x7) 13:39:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 79) 13:39:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:39:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext, 0x800, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8, 0x30, r0, 0xd8349000) 13:39:09 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0x4008, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) read(r2, &(0x7f0000000180)=""/109, 0x6d) write(r1, &(0x7f0000000080)="6e3bc4df0fc76da3c511c886da60e7f5cfad85288c65b820dcf5e9746441ed6182c67acab7b75a8d307e", 0x2a) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:39:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x41002, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r2 = syz_mount_image$nfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x5, 0x3, &(0x7f00000013c0)=[{&(0x7f0000000180)="9562b1e99a43990e9caaca821c26f2095ec26afe33c305d5f1999536ba7dabe0bae907020c324b250c6ffb0f060a02b8a5c6f0e401401de1759009ccbac174ab0e6e098f52efe462df53b25be6ef946e136ebf665bb1cd28eab8dd4b37938e02c2a7c24b1819b9fda79a68dbf73784eef3ed288c419449d7f8dc8a58b4eb8dea66966d8658d0b529179b7eb3f38733c081c240f638246d7b64", 0x99, 0x3f}, {&(0x7f0000000240)="dd466ef946f7df73872fdf2b16a48089de8fcf58b85fedd74edabe4dc02d92dd03097d45f6eb23bd4d44a207a91d7c8f18af15e59ed4419edeb17c0a06fb07de9d317eb683652c36fa8637fbae8c67c7f3be89d7f579b756105a6af61f24001217de9b4d6101c537107e9488edde4583ac42499a60c96f0d9b90384ee915954e025a3a1c14b6e36fb99000ced49c9e90c10d4305adf432f5beece9d41ac269107a3b812240953654d7c5ac77983ec5513797188b4b1950c118a2ea0c105f71f00bc0b82d20400f58eb8182092786e6c7bb9f6065be9c978cb3ecc54d22cb84451c0d0ca44970", 0xe6, 0x80000000}, {&(0x7f00000003c0)="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", 0x1000, 0x3}], 0x2030040, &(0x7f0000001440)={[{'{%-\''}, {}, {'&-$)'}, {}, {'#$+,.'}, {'-[}'}, {'-{'}], [{@obj_role={'obj_role', 0x3d, '\\#^\'$\xe7'}}, {@dont_hash}]}) read(r2, &(0x7f0000001480)=""/218, 0xda) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)={0x200, 0x400, 0x6, 0xfffffffffffffff8, 0x10000, 0x6}) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:39:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000040)) [ 1342.949549] loop2: detected capacity change from 0 to 4 [ 1342.957614] loop3: detected capacity change from 0 to 264192 [ 1342.974217] loop3: detected capacity change from 0 to 264192 13:39:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5427, &(0x7f0000000000)) 13:39:20 executing program 4: r0 = semget$private(0x0, 0x3, 0x544) semctl$SEM_STAT_ANY(r0, 0x3, 0x14, &(0x7f0000000080)=""/85) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) preadv2(r1, &(0x7f0000001100), 0x0, 0x7, 0x2, 0x11) r2 = semget$private(0x0, 0x5, 0x0) semctl$GETNCNT(r2, 0x6595f8bbd5a80d53, 0xe, 0x0) semctl$GETNCNT(r2, 0x1, 0xe, &(0x7f0000000100)=""/4096) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r3, 0x1) 13:39:20 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x367, 0x2, 0x3ff, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xa, 0xffffffffffffffff, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:39:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 80) 13:39:20 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0x4008, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) read(r2, &(0x7f0000000180)=""/109, 0x6d) write(r1, &(0x7f0000000080)="6e3bc4df0fc76da3c511c886da60e7f5cfad85288c65b820dcf5e9746441ed6182c67acab7b75a8d307e", 0x2a) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:39:20 executing program 3: prctl$PR_SET_FP_MODE(0x2d, 0x2) prctl$PR_SET_FP_MODE(0x2d, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) prctl$PR_SET_FP_MODE(0x2d, 0x2) 13:39:20 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000100)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() pidfd_open(r1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0xd6, 0x1, 0x2, 0x0, 0x5, 0x10040, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x530000000000000, 0x6f}, 0x82, 0x3, 0x7, 0x0, 0x4, 0x0, 0x2d, 0x0, 0x10000, 0x0, 0x64d}, r1, 0xf, 0xffffffffffffffff, 0x8) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000040)={0x4, 0x8, 0x5}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = syz_io_uring_complete(0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x3, 0x7e, 0x6, 0x0, 0x5, 0x60c40, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000002c0), 0xc}, 0x423c, 0x10000, 0x800, 0x7, 0x5, 0x80, 0x6, 0x0, 0x74}, 0x0, 0x3, r3, 0x1) ioctl$TIOCL_SCROLLCONSOLE(r2, 0x541c, &(0x7f0000000080)={0xd, 0x5}) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000280)={{0x1, 0x1, 0x18, r4, {0xffff, 0x8}}, './file0\x00'}) process_mrelease(r5, 0x0) ioctl$KDSKBENT(r4, 0x4b47, &(0x7f0000000180)={0x4, 0x6, 0x1}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) ioctl$AUTOFS_DEV_IOCTL_VERSION(r6, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) 13:39:20 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000540)={0x78, 0x1a, &(0x7f0000000100)="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"}) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000040)) [ 1353.463132] loop2: detected capacity change from 0 to 4 [ 1353.469885] EXT4-fs (loop2): invalid inodes per group: 0 [ 1353.469885] 13:39:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 81) 13:39:20 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) r2 = getpid() r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000140)) pidfd_open(r2, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x95256176b1dd35bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x12230, 0x7, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1f9}, r2, 0x0, r1, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) 13:39:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0xc040, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000100)=0x81, 0x4) read(r2, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x40000013}) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:39:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5428, &(0x7f0000000000)) 13:39:20 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0xffffffff, 0x0, 0x2, 0x2f944820, 0x5}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) [ 1353.620587] loop2: detected capacity change from 0 to 4 [ 1353.630571] FAULT_INJECTION: forcing a failure. [ 1353.630571] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1353.631629] CPU: 0 UID: 0 PID: 10985 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1353.631646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1353.631653] Call Trace: [ 1353.631657] [ 1353.631661] dump_stack_lvl+0xfa/0x120 [ 1353.631686] should_fail_ex+0x4d7/0x5e0 [ 1353.631702] _copy_from_user+0x30/0xd0 [ 1353.631716] memdup_user+0x7e/0xe0 [ 1353.631730] strndup_user+0x78/0xe0 [ 1353.631743] __x64_sys_mount+0x136/0x310 [ 1353.631761] ? __pfx___x64_sys_mount+0x10/0x10 [ 1353.631786] do_syscall_64+0xbf/0x390 [ 1353.631807] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1353.631820] RIP: 0033:0x7efc3433b04a [ 1353.631830] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1353.631841] RSP: 002b:00007efc318aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1353.631852] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc3433b04a [ 1353.631860] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007efc318af000 [ 1353.631868] RBP: 00007efc318af040 R08: 00007efc318af040 R09: 0000000020000000 [ 1353.631875] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1353.631882] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1353.631899] 13:39:20 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$TIOCSIG(r1, 0x40045436, 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000002040)={0x0, 0x0, &(0x7f0000002000)={&(0x7f0000000240)={0x2c, r3, 0x1, 0x0, 0x0, {0x4}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000005c40)='./file0\x00', 0x40000, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x71}}, './file0\x00'}) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x8, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x1c, 0x18, {0x5, @bearer=@l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}}}, ["", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040004) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000005cc0), r2) sendmsg$NL80211_CMD_GET_REG(r4, &(0x7f0000005d80)={&(0x7f0000005c80)={0x10, 0x0, 0x0, 0x80020000}, 0xc, &(0x7f0000005d40)={&(0x7f0000005d00)={0x1c, r6, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}]}, 0x1c}, 0x1, 0x0, 0x0, 0x18040}, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:39:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 82) 13:39:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5429, &(0x7f0000000000)) 13:39:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:39:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:39:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x51020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000040)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000080)) 13:39:29 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000040)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000003c0)={0x100005, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x1, "091f40ecaa73c7"}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000026c0)={&(0x7f0000000240), 0x6e, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/56, 0x38}, {&(0x7f00000023c0)=""/224, 0xe0}, {&(0x7f00000024c0)=""/171, 0xab}], 0x3, &(0x7f0000002580)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x120}, 0x2000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f00000013c0)={r2, r3, "7be916b6a7c372d241c9704bb0e304c0c74a4104264618f57de69e45bb1b4c0f9111ca8f77be72119274c987cd4f3063e13e6866a67b4e08082786d98ab55c5fd44fdd32f71435b8c7026478e77de0811ade3d2c4ed322957364192d0212dcf5c40a80b0671af0e9bc90574c4081fb69361a6c1f162729545cf461758c22cb4967e94efa8b55a5141325dc7b10bb617e48de697adfbbbf8b47e2579ddf2973c9498aca2a623577454543432508c67ad8a9c007d7dca7243d306ebd4150a1ebdc112d200c98f2272a6d822cb6313627f5220a887598b066e015a66a9e4b0cc29ee081d4c2c9a2844a91956649cd3cabd9b908da5a93cae8dacc025b757d20cf16", "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"}) 13:39:29 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0x4008, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) read(r2, &(0x7f0000000180)=""/109, 0x6d) write(r1, &(0x7f0000000080)="6e3bc4df0fc76da3c511c886da60e7f5cfad85288c65b820dcf5e9746441ed6182c67acab7b75a8d307e", 0x2a) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:39:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/4096, 0x1000, 0x3) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/102, 0x66) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r1, 0x2008}, {r0, 0x8030}, {r2, 0x9401}, {r3, 0x15fb}, {r4, 0x224}, {r5, 0x408}, {r0, 0x2020}, {r6, 0x4002}], 0x8, &(0x7f0000000140)={r7, r8+60000000}, &(0x7f0000000180)={[0x8]}, 0x8) shutdown(r0, 0x1) 13:39:29 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x101000, 0x10) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000100)="e988896e87cd09fefe1ba41d65e4bb972b21aa3fb5efe2adb4f0337e13e96bb729fe82f1e170f5ae97", 0x29}, {&(0x7f0000000140)="bf7cd8ad1392017d7d73ac911fcf06ce9318ad5b3eb30633ec426e31b1823c140fa302e08d952418b8f1f5c49f118991282174c246c4ff7addfac174d349dc3c909c6764ad18f9e6aee63d3baf572e1e84ff2eeba5a9b92524c1aedec49fe89251cb91bb283229596fcecaae186b9bb1995f494993d2a1a0dc0893d8e3a0347695cc0e6ba00f17", 0x87}, {&(0x7f0000000200)="7a9359d2475a41a0b3a33ac9a3b4c4a620aefd9f69c3f67303dd28303d7277d5172bf7f679586c8509cf20d535fead2d760b70b5929c9db719f920ff06a86591fc6ee635b8e1f2d20828e6a2449f2517fe414aa0a2adbeb391b62f956a4d2f53d36e132fff88614970a13936889e042864122798630fca9aa896e188bd9fb17d0df7ade08ae311712674a0b2363fb840d194a0b2bfc057892780a0d1d443e88acd7e378ef015a8e93c586466ae48257876b7591eee5f5533d2bcf8c0", 0xbc}, {&(0x7f00000003c0)="e3706f8e410494342d672d7314f531db889ca52bcd8772f358fa175b4b88c710cea99014b0364033994cd95f9323067c298600b7d792378974b123b01c34cfee8f0cabbf447067331e9f4a908dd312931b2c67679220885c27a98e604a8fe76881b938903308c6129ec55ef403b10515e6a1b8fcb0b6322d133e520489f67cb1940f6b5b1ce2989a3996d965c54e210494af33833895031c17dae6a66c8d46556a25c7faa890f6718d9916a813eb5f851765727c90adfdde4d2aea5bcc9a2487d18d", 0xc2}, {&(0x7f00000002c0)="1ab948ecb5cfaeaaaf4dffd74f892335a41f8bd8bdaf25439e9e7356a208a29c697071d2b311082a405c11f289cb99dcac56fa", 0x33}, {&(0x7f00000004c0)="7a0ea6643807252aa78c9c0249c0eafcba7ab2b566b79107a98fc9c3110cda7bbf749173a4871abc74319b1a8aa0b338cb627f75097eff5b1251c445e3357ad96e84acdbf771ee26124169bb59fe36f7e7af9711c9b004dff49b8000039a824d63897381f8d156", 0x67}, {&(0x7f0000000540)="b0a5888a124f381a6fb3a9175f7dd779c65a92a45aed901e5c20d4e094ba2497614f92765cd125a52ad385456cf20b8f927764a8a437e87c8d15dd7f270806ca92d7a3cfba14af4a2051ed75182266636c8669746ac246e68662359c435c68f6e81a82e81c4ac091cb4751fedcfd78bfd0b77161e5d6cfb45214dffb4535bedc1796f19301a4526ae2c3b57297eda9444928240289e2", 0x96}, {&(0x7f0000000600)="6fafe4609cfb99640d9f6a06b99e02adaa8c9c1a4dc20b9c669df256cb847719643274af3fe83472da3537817b2df6b449b3761cba6e33f2f2a4b221540aa0a567ffd7fd36ea03666d2e1f8ede401dcdd1546e28474400a1beee2cba2eb7bba559f43a209320f92fb42e6bc7f56159bb4f0a957682a94609a3fd83a26e9bc1e1808253a7742d0db9f9f3de7eba81b424d94a5ae04c92b7cfebc443990cee5974186391f12c367cf7c69504f234c4bc8f21300ae68f9b2753eefe4d5d1b5f3f3289d2a6ada9566f2a7f252fd35fc5f7eb9b48d655400c1f29152dc03a20d3b70e7ddc6069381a5a586af0083a4b9c1ed657a88e2fc86d53df33adcb7aa810dfb0382eda399196393bbab6be1931f692d3fc871557dd2ca896425bca5562863827347b1a5f4681ddc4e45252c2057634c5183b82fdd3758d53feb3f2e6a6bfcc94289f567fbf56d8a464c557c32a7e4afcb75988a29612965960d2af8608ece78105d87998d0d3e103eb7ed82874a869700c108642c922eabd41c109e68769f2cc60d72451eab444619444b1bb6ed01b36ebfe81aebac5f1539d2f6eb8ed3e2d8f1c4a3881f38efb7228e9fb3a81bb856b3ec86870e6c8b77dfa60185156be383e87f287e7a5264bcddc78119d9635cff3dca0322385221cc9bc247f1c647e2218bf7cdd9079d76e6fbb8b899260c6fd8a93c3495275c8acd2bc13943f23c82933b4d7d0963693002b830268e02af330319ead47fda0f503bfa52f20805f177cf50899cb71c0d314c3192b771515f3518079335818d70651943546382991bac949a41480b7bcaf8c234591b5963811a2904a9a37442803a001c9674e3a6a9ef5baac9cba249d2f77a4f9cbd968250b99920ea2f2c75bdb7048a0ded5a4acecc2cda381c0c62afe95c5f2784284147d1e3c80d7f3dec01ea63705466606c50e768336c2fcb898bd2c5f82bcbd4cf80b0bfee38b737fc5f430b96054a329f23d61df6078e9fb91dff86bab65280db3af7988491d680a90ec2fefcb5f1a7f3857174f752f47a75093dc16bd9aa23a9d18a3fb631a5c2a2230a75934fe259581b93a16ee25b47689f1bf7268c005c904e0574a64bebe60315de7ee29d06083406a25b903445bf0540f1f83e4d40280465703173ddfee0b7de0fc2af0da6698e8cc01cf5dda9c9032325fbb853e8183c5af9021f232434925108fbfd1110c5ea718c2dabe25d4c8da613e5ab787808030fc71f242c1f3975146c6b9ffc4203bee5d32ce0e2801394839a0559af3a0da1ae1b1db09257f933bb7529379e55fe843e01246dbd656b33599c20bfc5d0a9084100b2ddcbf6593cb2f178d313143c639e08c10d65d244453a7f71b37397c18d25cad6df0e7bab31d7b9d392db44caf77a57cd95f6d6e52bed54dc3347c1b884f548d024ef7dd016c42e679452b529078caa8bf469c9b4fb91ea3cf422f39a651062478df56969a3e406eb9d380125c873d1fdf3ceca564867d2ac3663a6df6b90f5d01593667e11371d9dba764f066fe6970c2931b6f68e3ec4fb8b57a6cc65ee6579592a72d1158de051bcf1a7ea54ceee344f9c2c879dd253b12c139f13651d7496088062274bede21e38ad808e097acf1798b0d33b36b6509dfe577d9352e40deac016640d84099cdd69bd31c3294e42a55ef8add3b42c8db97252e7c98fae6715ce0131b7eb6d59a8c724b97742e7acab8c997e403c242d410580a9a69d1d3729ab3c8247f1fc4ef98f90cdd2904952a51efb0ade5b1b34090b16f39612d95e2fdb1534c2e71650c530a9a82e197c6d7c4c54aaf76bf99a1683602774b9b84c98c4bba1c6143e9d70424e6582be4b2e685f1c851277a36ac1a1ffb8ec50c01c568fca5f63651b66cf62281b9a64dd05ed331a1ddb874f08796764a9f8e7ea165d3dcf04692998b4583b7db10ee7f99fd45ba461db60318516ddcd4e38285a3394803b822fad7c41464e322bd31a077914da4e3f77784dd6106b78c584f379ac32f587919b0946890fab94b10c102300f3b869ef7720b9f5553141c57e2e124061c8732d3034bd287aca8318c23b0bcc02f81b4dbf6e0f5305213f2cbc771a06c0c79bd2f354989fcd4d4794588c604a180c3b4026cb8c0198a8b99e7f80bb67033766e43e99c0346b97510587d4240dbbed3070681c7337009b1142b07f1a2f3b4832bdd7aa6d626d39a7ac9b12b28959fe96ffe70083b040e3da0fe2b889220d66cac7b6fa3176fd9ce6cab056b88db25d66af8b50b9e7aa1723d0a09fadbd3acca0ea34afb5a69ccc1c9da17592761ab707840ffb03c5a88b3f08261f5a412dd9c50e15bf671d125eeef316bc0a5827634a91ca97702877b9f51197641fe79eb830cc40ae85eb9096aa8f256b8a75d574bc8e2fd9de320467526116fa859c6a2e2b3af505110ba246d92c1a3d0c569ffde50acb02886e549e69a68defaf91c4836a42999d401d9ba2b1cd263736219f81aac719a9b5368e14baeaf74c9a4b0a3e7038d42068696b55da8cc7bdd350b5fbd54aa86b1789b6be8f2a85263b39cbcd1ee86bd5662bfe35548895a81bb5abd4b672ea0bc7ae77fde34e39a849dc248680def1e34f7d3fe1b1bca02c0b2e30f861a912d22e4a7214808cdd99b4d858c792299691a18f2843bf51ea1d0d19f98f6798562e39cc3a0cf3914769c22b3ac658cd984e888407e6e0b1c6613db2903a6ee785b92a28bf1207cb43d6c860e7f1b2bdf6d5fe4f8aafc58f866479fd2aa8d61c438fa6ff42f530a3771f81d7b3a47915b7b88e267d72185149108a69f81e90069b269a27d97f9511547460a0d6cb7014a83753debc86ba4cc09558c46c12c2d1bae7735089146846b0afe37917271345d05022b4e222c5c70b1a5d9e03741df7598e15bd9abd2b58aada0e35193929157f5593924449d7515590e24e31e71ade466b286b5d3d62110fafaeec8d47a7a9c7829b84ebcf824bcaa9f261e85fc6a7aa7de4e825f980313d5b830e55a7eca042e30699e1d32a0850f19770c599380a3619c8b22a39967fd1044c38623c3d3f42b390a705d1b98eb409e31c29c1b64fce1bfed977e1f6c37a4f834b196af215d1c72027b5a5dcc8220c647ace4ea13e0eb0cd9856be80762f3421a4b9cb930acbf93643cb6f92e21919859c9ebb288910cb7e36b1ac8a3e609351b833bd2ca5c60243ac76c862abcd6edc9804215d4abc285fcb88a1a841b0d08ce77c9cdf137030c303e733939da23b25b8fdd3a5432fbe82371c3493dcc180a6c7bc3eaf130c6a89c80473e93585b7309e330e43e42807c3e820bdf065310522b6d19c29b47b9688b41e0f0a984845c13e6e281eb1538cb92999a6aa798864f50ca05898aad802e7503df07647ff00bc48fa3ae2850b6a6cbd5870fdbf3e8c2b633dd48193dfac45c6f77eb22c17fcb9f81d18bf273b1a621894e91ff336fdd61792baa0a8230d993ebb299ea6ff756db4437b0414e80001a24c4622aa61d6d4cd42506837cfb04fe5ec16006a832c4e2b341163e93905c57050bf00da4beb34c052f778b0d7994f862d926e409fae45f1e29294b25ee02b02ce8e93b68295cfb499c6ef5420ba67da7b4e312eb62adda78042b922a32730160927d71abd2412d95d76e96cfbbdd50fb92485dced5bfaaed65c354a499692634799854db9f6581769b322ec1b7bd6707eeafab0fa99c98ec9946de49beef701c87655bb382bbee865817dff018631ab5c6f7da593e5f2f870be5fe228fdc0821d59591121fd45c582134061ea9efcb0f72fc2534010da5d5a58a2d80f0817a304598fc1cbb6d9373fc4c276a9d69f4dd82724ea9d296fce7769625b2617e5cf283b6adc028273c36c201b4707fe99f375664e73ac0947aa667a5a9e5198726a1f7285d16edf64b0576150b6acc9acdb420a3db4d42ef76e82093746dcd672b7681465d89012e95f6ce4b876797f17e0a89b56b5b2e7009df33af4fe04ee52ce88fbc46052e7cf8763135d752be97afb759c09f02442c0a19475f00a2869e496bc4352f6704f043e5c02f1fb4c8d43092bba4542ac869e6c48b6fddf046b475f22173cab918771462b98b7ee255ef2ee356c13f7f65de4acbc1ac49dad93cd4ddfe03c3f364aadbf372fd15c4cb2b5c4f5f69edec8529b78d3c5f76879ae872d6ee795035862d7abe9840d1e7e97cc25b20ef1d8079cf5476f5e7615f362f038f482a0bd4f9236002700043a5e0d7823bf9e7359ecbedb7dfe5eb526a174bbf26473257d0fc76c857ee81e3a4a976f79e8d19eadde28c771c906989bc10ed231b4520d74b2ba469a1932a16a4476052de106cb654dfdd73cda6109a0868b215436db45b89c97b442ee5b62c4be44d43ed49966578ca102f3a8d70c867af159cbba867655db690313991d36c79367f002292a93f294b640e6d0f0b540db77900197bf60d7d87c3b2823280b1e897c35b2ad5345f2c67f2f0198d4cb5b0555650c061c86d12c09373213a577b04b82a3767265bd298b30e9840b6c6a2af2df160d6e7b3448d51079f52bf6a212d4402ef60869a89fad21f191405768990d65a994ac07ba2a03c6855ac8dd5d87ac350e4c9862383493429aa6ce76e23d282e8f857d18bf955722845d913eb09fc59e25a32236c6659dda24b6de21c02d32523a63c378a36a54a76007468b8d3262605cba68e94c9a9e2288bdf37b8dd7723a353d594bd2cde7c1b1335ce5a801af207ea6ba855ee1b1e4321acd48f9b46d20bee3a16a7ad526f1515a65098da95017cc9bd5f84b5a84c2d7951cd054039e061f58269ef324158e15addb99772ecff368389cee7523bee90a3e532826100cdc3aceae71c398da95f69224e659e7348050eaa8100cbb13ecbadbb813af902a20195fb9c55c3d688f6f45870d57b6a835e841b7a3cde0df737cb2ac29c5b67e1baf410d45154a171e681d39f8358df80043eef0b00fb087e87341658d7afb2b6972ee3cd4a16e7f4101c1d69fc33eefede3857c0bf777f7e2ab581398972a3e4ccb949ab74a2ed865861e3aeb303ec50e77ec62b540aaf759eedf65bca180a56299413d09969c3cc422afbe07b5ebe4ea6df4dbdc95bf7cb33faf92021c59765b12e319d0026ea92e69b102eb83345bcc9a97c5400848fdfe732a60fd955ea8225970fdd36d0e14cb6ce0c7ce3aa889a334005ee1f44121eccae00ed539fda9e1479f13e29701cb733bf889c5ecd454d10b1f5804c95049dd89af69217cc4d88e5c0b611e75d824270053e8eeeb42f81a32427a5dc7f0e3a97640363c4e332e48378001187ba65d1a9bafeab7485f32b3de5ca44337ebb9362000f1f5534ae36d0c59fb87912bc9cf1a96e6ed4db68dcedfe553e9fe2caf68d51d2e30bab61e05eb41f0b054cc9871d7d74ec5ab7b7a6d32d40e4346e740ca06c665a3744da46e9313f42cef54717cb4a7bcb3444db5b3bf31b3753e39dec77af116a044de0a646fdb0d8b71fcd20100d0ee42a1d1f7abfe3529e0459048ddd547d2c318c58696206e1068ba6ce06df5b9b5ee3007bef4ecc25a3a7dfb209d79606c45a5bce2bed09d4c21bfec12e32027d5b6e6d91e2888021462c458f5fd8e0941838a49f513c4bc79c2d9e041ab37fea8f6dacceca52a21f3bc78faaafbbc2d243cf27959176268e17d71dd8f094751d9ad6b0e269670d46e864c3a8f5748fec800c7452b6d727cce77ec1271bfc844f74bec87cb3447b479f832a518749ac2ba967d67e6972e99bab01766bc0eae5c1a75f762fc065792f5be913430152483f11", 0x1000}, {&(0x7f0000001600)="729be3019138d5e05b8e730be9b217c4de85d93d3f3dd773cf4be2a3527ae6fa73891ec1654d3bd7ae0894190e9ef24bbedf9ebe6f50379df8d592469857cd01eb33098ec641f2e05ceec10231301ddc40e8283236113a1b6df3d5b76577ed56a584629cbf0c6bacf533d376812218aa740a3ac69e1e13caf5282b229e2106d24211ba1e216c17d776fae80e4c4b7d6069fbb8a0c820bd7eec", 0x99}, {&(0x7f00000016c0)="c4e5572ff4616180550ba8dc607ec73eb6ee57c1c8d17c14ad5ce93ba49f9562713ab14ff6e2594b7058807bdcb5fd2b4a4d52c16367cda8197c825e00b5f31766410c516174fb8d2efd066cc28c873b195e9758228e9a8e772a10b00324ee49868b925ab338658bb7164ee4edbb51f4b4973bedd65766283510f469425b9d93611d614d95a42491b652f9736579", 0x8e}], 0xa) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xc2, 0x20, 0x0, 0x0, 0x0, 0xffff, 0x2170, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0x4, 0x1}, 0x40000, 0x2, 0x8001, 0x4, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x2) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) [ 1362.889310] loop2: detected capacity change from 0 to 4 13:39:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0xce00000, 0x3, 0x6, 0x6, 0x3, "3059ac07f9f13cfe22e4c7fbd2e6ec00cf8de2", 0xd83, 0x6}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000080)="df4087fae55ec8138c355e76e928853653f75105feb462fce96a55b23fd2702372e0137a475d6292a67cf2475cc9f09481da7c4122ec1eb1b5aca7bc7bdfbf778a6ab6c4ecabc6305a99663d68324a674a96874f243d61d21b2df0638cdc6a124068528e6dd90bb22d9fa62d852e0ddcf74d4ee726df506ea1", 0x79}, {&(0x7f0000000100)="2ff82f6de44557901f053e7bb282ac1e38c3020179f350ab0793ca1b4ef207e5bf0dd4c2c4c950c534edcd1ed20930b4361307c333c2dcc899b471d9cb00b26a015e3d706b280a395b96a9107a0d2183af51a6c2432249835e54f38a133b10fbe271b37e6e885e586ea8f7c113a38bb27d266537e72b110969d28be64c8b208f836b57471c1ecb90e5d383c24a9bbc002f0cb174024316fc76ef99fec680e929540cd012da728e349ba5d3fe23b4eddf3ec9d34fec950060af1783a9bae49fc86c92e6e9a49d8312f965fb54634852e9e9a1fe7ff7a51f2563b9e767ef2682c73d6958dac10f4ac402c58deb5ae8dbb96a85ee26", 0xf4}, {&(0x7f0000000200)="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", 0xfc}, {&(0x7f0000000300)="15487965c27656af9a1a8bdaa86006f3f74392", 0x13}, {&(0x7f00000003c0)="c1c3a6c0ea5b56c7b6", 0x9}, {&(0x7f0000000400)="d99d2da84da1e3ab25c67cf54a2af64aa26ab5d2f80e5f09ff7a749c0787edc231a6c9f13003a5c38eca1730bee4d78a3c807ffbe9a06de4b83628bf116245d5d0339d6c7614294317b06585b8bd47cd9107dc4d34c3b9ddc2bf67a1d8059e2beeb48df5f7b861594789ed0637648f83ada2ec99ae3b698f1fefe9abb4c2231ba58034f296f9ead8ea5b4678718b03b517314c780e9258f3cc39282a736cdc14ce4b851c149e02823c01466d0099623ae43357aab388f916db3f4797eb61c58db6321ec9efb6e294150660450b09ea05521d232f4aaa3836cb85e81d21d67b15f41d2a93f48676f077c0", 0xea}, {&(0x7f0000000500)="6048b0ee4c64e52a438fd9e45e2a95f60753a65b16672ced618c1252d045", 0x1e}, {&(0x7f0000000540)="d9b950d5f291f19f8bcc4c2345739a6a4f590389d2a4f97ad59c72585536ac514cef87be9224da0bbc10487cf0f7adba19346a9fc550594cc2d8", 0x3a}], 0x8) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) [ 1362.899347] EXT4-fs (loop2): invalid inodes per group: 0 [ 1362.899347] 13:39:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5437, &(0x7f0000000000)) 13:39:29 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000000)=""/16) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:39:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 83) 13:39:30 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) [ 1363.027086] loop2: detected capacity change from 0 to 4 [ 1363.039934] EXT4-fs (loop2): invalid inodes per group: 0 [ 1363.039934] [ 1367.444772] Bluetooth: hci6: command 0x0405 tx timeout 13:39:38 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0x4008, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) read(r1, &(0x7f0000000180)=""/109, 0x6d) write(r0, &(0x7f0000000080)="6e3bc4df0fc76da3c511c886da60e7f5cfad85288c65b820dcf5e9746441ed6182c67acab7b75a8d307e", 0x2a) 13:39:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5441, &(0x7f0000000000)) 13:39:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) 13:39:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x400200, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000140)=""/94, 0x5e) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f00000001c0)) ioctl$TIOCSTI(r2, 0x5412, &(0x7f00000000c0)=0x76) r4 = openat(r1, &(0x7f0000000100)='./file0\x00', 0x140, 0x20) lseek(r4, 0xfffffffffffff800, 0x3) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:39:38 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000040)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000240)=""/106) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="d4455ed7489002fa5bb7f3510e98045448fc7742bfe53b3f1d8b8397bd9c", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0410002e2f15a3533b3000"]) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f00000000c0)="b5fe80c8541c3a750a63c571276b002b5952e6b86ea0ebaa52499199a099f0a2aa5724a4443d7acf02bff172bb127ebdec33db0237") ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x4008f510, &(0x7f0000000200)=0x7) ioctl$GIO_FONTX(r4, 0x4b6b, &(0x7f0000000140)={0x7d, 0x1d, &(0x7f00000003c0)}) ioctl$BTRFS_IOC_SPACE_INFO(r3, 0xc0109414, &(0x7f00000007c0)={0xcc8, 0x9, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/102, 0x66) ioctl$KDGKBMETA(r5, 0x4b62, &(0x7f0000000180)) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000013ac0)={0x0, 0x4, 0x5}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000013ec0)={0x1f, 0x0, {0x7, @usage=0x20, 0x0, 0x3ff, 0x7fff8, 0x101, 0x9, 0x1, 0x40, @struct={0x2, 0xffff8000}, 0x4, 0x8, [0x7, 0x2, 0xa8, 0x10000, 0x8, 0x1]}, {0x3f, @usage=0xffc0000000000000, 0x0, 0x0, 0x53e, 0x4, 0x4, 0x72, 0x4, @struct={0xfffffffa, 0x9}, 0x4, 0x9, [0x3, 0xcdb0, 0x67, 0x9, 0x2, 0x4]}, {0x1, @struct={0xff, 0xffffffff}, r6, 0x1, 0x401, 0x1, 0x100000001, 0x2, 0x90, @struct={0x4e1, 0x3}, 0x1000, 0x21a0b39e, [0xfffffffffffffff8, 0x7, 0x8, 0x1, 0x0, 0x2]}, {0x8, 0xf06}}) 13:39:38 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x1, 0x4, 0x7, 0x184, &(0x7f00000003c0)}) fsetxattr$security_selinux(r0, &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:modem_device_t:s0\x00', 0x24, 0x2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000000000}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5a86, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000140)) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000100)={0x1, 0xffffff9b, 0x8, 0xd, 0x110, &(0x7f00000007c0)}) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) ioctl$TCXONC(r1, 0x540a, 0x1) 13:39:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 84) 13:39:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDDELIO(r0, 0x4b35, 0x9a) fchdir(r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$VT_ACTIVATE(r0, 0x5606, 0x81) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000200)={0x7, 0x1000, 0x6}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000180), 0x40200, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f00000001c0)={{r4}, 0x6, 0x4, 0x6}) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r2, 0xc038943b, &(0x7f0000000080)={0x13a5, 0x18, '\x00', 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0]}) [ 1371.744838] loop2: detected capacity change from 0 to 4 [ 1371.748307] FAULT_INJECTION: forcing a failure. [ 1371.748307] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1371.749269] CPU: 0 UID: 0 PID: 11057 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1371.749286] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1371.749294] Call Trace: [ 1371.749299] [ 1371.749303] dump_stack_lvl+0xfa/0x120 [ 1371.749329] should_fail_ex+0x4d7/0x5e0 [ 1371.749346] _copy_from_user+0x30/0xd0 [ 1371.749360] memdup_user+0x7e/0xe0 [ 1371.749375] strndup_user+0x78/0xe0 [ 1371.749389] __x64_sys_mount+0x17f/0x310 [ 1371.749407] ? __pfx___x64_sys_mount+0x10/0x10 [ 1371.749429] do_syscall_64+0xbf/0x390 [ 1371.749451] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1371.749468] RIP: 0033:0x7efc3433b04a [ 1371.749477] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1371.749489] RSP: 002b:00007efc318aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1371.749501] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc3433b04a [ 1371.749509] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007efc318af000 [ 1371.749521] RBP: 00007efc318af040 R08: 00007efc318af040 R09: 0000000020000000 [ 1371.749529] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1371.749536] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1371.749554] 13:39:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 85) 13:39:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5450, &(0x7f0000000000)) 13:39:38 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r3) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() r8 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [], {}, [{0x8, 0x0, r9}]}, 0x2c, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x4}, [{0x2, 0x1, 0xee01}, {0x2, 0x4, 0xee01}, {0x2, 0x0, r3}], {0x4, 0x4}, [{0x8, 0x1, 0xee00}, {0x8, 0x2, r4}, {0x8, 0x2, r5}, {0x8, 0x2, r6}, {0x8, 0x6, r7}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x6, 0xee00}, {0x8, 0x2, r9}, {0x8, 0x0, r10}], {0x10, 0x2}, {0x20, 0x2}}, 0x84, 0x1) [ 1371.873787] loop2: detected capacity change from 0 to 4 [ 1371.904530] FAULT_INJECTION: forcing a failure. [ 1371.904530] name failslab, interval 1, probability 0, space 0, times 0 [ 1371.904572] CPU: 1 UID: 0 PID: 11078 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) 13:39:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 86) [ 1371.904600] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1371.904613] Call Trace: [ 1371.904621] [ 1371.904630] dump_stack_lvl+0xfa/0x120 [ 1371.904670] should_fail_ex+0x4d7/0x5e0 [ 1371.904703] should_failslab+0xc2/0x120 [ 1371.904736] __kmalloc_cache_noprof+0x73/0x6a0 [ 1371.904758] ? __might_fault+0xe0/0x190 [ 1371.904789] ? copy_mount_options+0x55/0x180 [ 1371.904829] ? copy_mount_options+0x55/0x180 [ 1371.904859] ? memdup_user+0x95/0xe0 [ 1371.904882] copy_mount_options+0x55/0x180 [ 1371.904921] __x64_sys_mount+0x1ab/0x310 [ 1371.904951] ? __pfx___x64_sys_mount+0x10/0x10 [ 1371.904992] do_syscall_64+0xbf/0x390 [ 1371.905029] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1371.905052] RIP: 0033:0x7efc3433b04a [ 1371.905069] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1371.905092] RSP: 002b:00007efc318aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1371.905113] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc3433b04a [ 1371.905127] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007efc318af000 [ 1371.905141] RBP: 00007efc318af040 R08: 00007efc318af040 R09: 0000000020000000 [ 1371.905155] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1371.905169] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1371.905201] [ 1372.013522] loop2: detected capacity change from 0 to 4 [ 1372.015975] FAULT_INJECTION: forcing a failure. [ 1372.015975] name failslab, interval 1, probability 0, space 0, times 0 [ 1372.016012] CPU: 1 UID: 0 PID: 11084 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1372.016040] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 13:39:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 87) [ 1372.016052] Call Trace: [ 1372.016059] [ 1372.016067] dump_stack_lvl+0xfa/0x120 [ 1372.016108] should_fail_ex+0x4d7/0x5e0 [ 1372.016134] ? getname_flags.part.0+0x48/0x540 [ 1372.016155] should_failslab+0xc2/0x120 [ 1372.016187] kmem_cache_alloc_noprof+0x72/0x680 [ 1372.016221] ? getname_flags.part.0+0x48/0x540 [ 1372.016240] getname_flags.part.0+0x48/0x540 [ 1372.016264] getname_flags+0x95/0xe0 [ 1372.016291] user_path_at+0x27/0x90 [ 1372.016328] __x64_sys_mount+0x1fb/0x310 [ 1372.016373] ? __pfx___x64_sys_mount+0x10/0x10 [ 1372.016424] do_syscall_64+0xbf/0x390 [ 1372.016481] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1372.016513] RIP: 0033:0x7efc3433b04a [ 1372.016532] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1372.016558] RSP: 002b:00007efc318aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1372.016588] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc3433b04a [ 1372.016610] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007efc318af000 [ 1372.016632] RBP: 00007efc318af040 R08: 00007efc318af040 R09: 0000000020000000 [ 1372.016649] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1372.016668] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1372.016711] [ 1372.094346] loop2: detected capacity change from 0 to 4 [ 1372.105892] FAULT_INJECTION: forcing a failure. [ 1372.105892] name failslab, interval 1, probability 0, space 0, times 0 [ 1372.105930] CPU: 1 UID: 0 PID: 11087 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1372.105960] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1372.105973] Call Trace: [ 1372.105980] [ 1372.105989] dump_stack_lvl+0xfa/0x120 [ 1372.106029] should_fail_ex+0x4d7/0x5e0 [ 1372.106056] ? getname_flags.part.0+0x48/0x540 [ 1372.106078] should_failslab+0xc2/0x120 [ 1372.106112] kmem_cache_alloc_noprof+0x72/0x680 [ 1372.106147] ? getname_flags.part.0+0x48/0x540 [ 1372.106168] getname_flags.part.0+0x48/0x540 [ 1372.106194] getname_flags+0x95/0xe0 [ 1372.106231] user_path_at+0x27/0x90 [ 1372.106266] __x64_sys_mount+0x1fb/0x310 [ 1372.106306] ? __pfx___x64_sys_mount+0x10/0x10 [ 1372.106350] do_syscall_64+0xbf/0x390 [ 1372.106391] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1372.106419] RIP: 0033:0x7efc3433b04a [ 1372.106438] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1372.106461] RSP: 002b:00007efc318aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1372.106485] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc3433b04a [ 1372.106504] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007efc318af000 [ 1372.106521] RBP: 00007efc318af040 R08: 00007efc318af040 R09: 0000000020000000 [ 1372.106536] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1372.106551] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1372.106591] [ 1375.005794] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1375.009155] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1375.010986] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1375.015440] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1375.018964] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 1377.044599] Bluetooth: hci1: command tx timeout [ 1379.093593] Bluetooth: hci1: command tx timeout [ 1381.140601] Bluetooth: hci1: command tx timeout [ 1383.188648] Bluetooth: hci1: command tx timeout [ 1388.359234] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1388.361011] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1388.395330] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1388.396139] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 13:40:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 88) 13:40:04 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:40:04 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0xea, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9, 0x1, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fgetxattr(r0, &(0x7f0000000180)=@random={'os2.', '\xff\xff\xff\xff\xff\xff'}, &(0x7f00000001c0)=""/98, 0x62) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x801, @none}, 0xe) r2 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0) r3 = dup(r2) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000100)={0x53, 0x0, 0x10, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000000)="88c46021598889191f06faa23898168b", 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0}) r4 = memfd_secret(0x0) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x5, @none, 0x2, 0x1}, 0xe) fallocate(r4, 0x10, 0xfffffffffffffffc, 0x0) shutdown(r1, 0x1) 13:40:04 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0x4008, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) read(r1, &(0x7f0000000180)=""/109, 0x6d) 13:40:04 executing program 0: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:40:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) fallocate(r0, 0x0, 0x5, 0xbd5d) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000040)={0x5}) 13:40:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_secret(0x0) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000040)={0x1, 0x1, 0x1c, 0x19, 0x55, &(0x7f00000003c0)}) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:40:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5451, &(0x7f0000000000)) [ 1397.616338] loop2: detected capacity change from 0 to 4 [ 1397.622805] FAULT_INJECTION: forcing a failure. [ 1397.622805] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1397.624804] CPU: 1 UID: 0 PID: 11546 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1397.624834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1397.624847] Call Trace: [ 1397.624855] [ 1397.624863] dump_stack_lvl+0xfa/0x120 [ 1397.624905] should_fail_ex+0x4d7/0x5e0 [ 1397.624933] strncpy_from_user+0x3b/0x2f0 [ 1397.624968] getname_flags.part.0+0x8d/0x540 [ 1397.624996] getname_flags+0x95/0xe0 [ 1397.625024] user_path_at+0x27/0x90 [ 1397.625053] __x64_sys_mount+0x1fb/0x310 [ 1397.625085] ? __pfx___x64_sys_mount+0x10/0x10 [ 1397.625128] do_syscall_64+0xbf/0x390 [ 1397.625165] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1397.625189] RIP: 0033:0x7efc3433b04a [ 1397.625206] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1397.625227] RSP: 002b:00007efc318aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1397.625249] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc3433b04a [ 1397.625264] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007efc318af000 [ 1397.625278] RBP: 00007efc318af040 R08: 00007efc318af040 R09: 0000000020000000 [ 1397.625292] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1397.625305] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1397.625338] 13:40:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5452, &(0x7f0000000000)) 13:40:04 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xe4000000}}, './file0\x00'}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r2, 0x5409, 0x40) 13:40:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000040)=""/3, 0x3}, {&(0x7f0000000080)=""/193, 0xc1}], 0x2) syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:40:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 89) 13:40:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x545d, &(0x7f0000000000)) 13:40:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='\x82%[:/\b]#0\xc7\xd5+\x00') 13:40:04 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x24a}, 0x186, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000040)={0x1f}) 13:40:04 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x81) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000040)=@l2={0x1f, 0x81, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x6982, 0x1}, 0xfffffeec, &(0x7f0000000240)=[{&(0x7f00000000c0)="51f14235c33c71988b8ce4eaa766081ae2f119026aed302740e6d1ae3c6500043fb78bd8566f0e84ac39066b9570e8855b9dfecd45fd2f16c58fe0f3658dde3176ff9e5b1a2536f6a98ed3593eb59c74b0044c7dd2acee062793aa534dd1c246fd4810892327aee2b2ffd7fff90b80303a2d0bad790db9", 0x3f}, {&(0x7f00000003c0)="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", 0xbe}, {&(0x7f0000000200)="12c2367e6358fcb8f44514eaffd80b246f2231cdd890a0d376642dc9d23b76209f8fe8eb62cabd62891817de6383addfe0633db037d960caabba7a", 0xff52}], 0x3}, 0x10080) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:40:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) r3 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) r5 = syz_open_dev$char_usb(0xc, 0xb4, 0x1ff) poll(&(0x7f0000000100)=[{r1, 0x4060}, {r3, 0x3000}, {r2, 0xc0}, {r4, 0x2640}, {r2, 0x1081}, {0xffffffffffffffff, 0x466}, {r5, 0x4400}, {r0, 0x5000}], 0x8, 0x7fff) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x1c, 0x10, 0x4, &(0x7f00000003c0)}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000af3d43d2589b52d3cc661bba002801", @ANYRES32=r0, @ANYBLOB="ff000000000000002e2f66696c653000"]) ioctl$TIOCVHANGUP(r6, 0x5437, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) [ 1397.844598] loop2: detected capacity change from 0 to 4 13:40:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5460, &(0x7f0000000000)) [ 1397.853280] FAULT_INJECTION: forcing a failure. [ 1397.853280] name failslab, interval 1, probability 0, space 0, times 0 [ 1397.853322] CPU: 1 UID: 0 PID: 11578 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1397.853353] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1397.853367] Call Trace: [ 1397.853375] [ 1397.853384] dump_stack_lvl+0xfa/0x120 [ 1397.853428] should_fail_ex+0x4d7/0x5e0 [ 1397.853467] should_failslab+0xc2/0x120 [ 1397.853503] __kmalloc_cache_noprof+0x73/0x6a0 [ 1397.853528] ? find_held_lock+0x2b/0x80 [ 1397.853566] ? __get_fs_type+0xe6/0x160 [ 1397.853599] ? alloc_fs_context+0x58/0x9e0 [ 1397.853635] ? alloc_fs_context+0x58/0x9e0 [ 1397.853662] ? _raw_read_unlock+0x1e/0x40 [ 1397.853692] alloc_fs_context+0x58/0x9e0 [ 1397.853729] path_mount+0xd87/0x20d0 [ 1397.853764] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1397.853795] ? __pfx_path_mount+0x10/0x10 [ 1397.853828] ? kmem_cache_free+0x2a4/0x540 [ 1397.853855] ? putname.part.0+0x11b/0x160 [ 1397.853894] ? getname_flags.part.0+0x1c6/0x540 [ 1397.853921] ? putname.part.0+0x11b/0x160 [ 1397.853965] __x64_sys_mount+0x293/0x310 [ 1397.853999] ? __pfx___x64_sys_mount+0x10/0x10 [ 1397.854044] do_syscall_64+0xbf/0x390 [ 1397.854084] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1397.854108] RIP: 0033:0x7efc3433b04a [ 1397.854127] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1397.854150] RSP: 002b:00007efc318aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1397.854173] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc3433b04a [ 1397.854189] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007efc318af000 [ 1397.854204] RBP: 00007efc318af040 R08: 00007efc318af040 R09: 0000000020000000 [ 1397.854220] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1397.854234] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1397.854269] 13:40:15 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000040)="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") 13:40:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:40:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) 13:40:15 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0x4008, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) read(r0, &(0x7f0000000180)=""/109, 0x6d) 13:40:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x40049409, &(0x7f0000000000)) 13:40:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 90) 13:40:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x1ff) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) r2 = getpid() pidfd_open(r2, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x7f, 0x4, 0x1f, 0x80, 0x0, 0x10001, 0x20c40, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x73a2, 0x4, @perf_config_ext={0x100, 0x5}, 0x40400, 0x5, 0x1, 0xb, 0x0, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7ff}, r2, 0x2, r3, 0x2) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) ioctl$KDGETKEYCODE(r4, 0x4b52, &(0x7f0000000100)={0x1000}) 13:40:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x81, 0x0, 0x0, 0x0, 0x4, 0x10100, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x8000, 0x8b7e39f, 0x7, 0x7, 0xffff, 0x6, 0x400, 0x0, 0x20, 0x0, 0x80000000}, 0xffffffffffffffff, 0x6, r1, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) [ 1408.455285] loop2: detected capacity change from 0 to 4 [ 1408.466212] EXT4-fs (loop2): invalid inodes per group: 0 [ 1408.466212] 13:40:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) poll(&(0x7f0000000040)=[{r1, 0x8000}, {r2, 0x504}, {r1, 0x3002}, {r1, 0x20}, {r3, 0x2}, {r4, 0x1010}, {r1, 0x2}], 0x7, 0xe447) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:40:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 91) 13:40:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x20}}, './file0\x00'}) [ 1408.567402] loop2: detected capacity change from 0 to 4 [ 1408.573384] FAULT_INJECTION: forcing a failure. [ 1408.573384] name failslab, interval 1, probability 0, space 0, times 0 [ 1408.574315] CPU: 1 UID: 0 PID: 11629 Comm: syz-executor.2 Not tainted 6.17.0-rc7-next-20250923 #1 PREEMPT(voluntary) [ 1408.574332] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1408.574339] Call Trace: [ 1408.574344] [ 1408.574349] dump_stack_lvl+0xfa/0x120 [ 1408.574374] should_fail_ex+0x4d7/0x5e0 [ 1408.574393] should_failslab+0xc2/0x120 [ 1408.574412] __kmalloc_cache_noprof+0x73/0x6a0 [ 1408.574426] ? trace_kmalloc+0x1f/0xb0 [ 1408.574442] ? __kmalloc_cache_noprof+0x26d/0x6a0 [ 1408.574453] ? ext4_init_fs_context+0x45/0x110 [ 1408.574474] ? ext4_init_fs_context+0x45/0x110 [ 1408.574488] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1408.574505] ext4_init_fs_context+0x45/0x110 [ 1408.574520] ? __pfx_ext4_init_fs_context+0x10/0x10 [ 1408.574536] alloc_fs_context+0x570/0x9e0 [ 1408.574556] path_mount+0xd87/0x20d0 [ 1408.574574] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 1408.574589] ? __pfx_path_mount+0x10/0x10 [ 1408.574605] ? kmem_cache_free+0x2a4/0x540 [ 1408.574618] ? putname.part.0+0x11b/0x160 [ 1408.574638] ? getname_flags.part.0+0x1c6/0x540 [ 1408.574651] ? putname.part.0+0x11b/0x160 [ 1408.574672] __x64_sys_mount+0x293/0x310 [ 1408.574688] ? __pfx___x64_sys_mount+0x10/0x10 [ 1408.574710] do_syscall_64+0xbf/0x390 [ 1408.574730] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1408.574743] RIP: 0033:0x7efc3433b04a [ 1408.574752] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1408.574763] RSP: 002b:00007efc318aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1408.574775] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007efc3433b04a [ 1408.574783] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007efc318af000 [ 1408.574790] RBP: 00007efc318af040 R08: 00007efc318af040 R09: 0000000020000000 [ 1408.574798] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1408.574805] R13: 0000000020000100 R14: 00007efc318af000 R15: 0000000020012e00 [ 1408.574822] 13:40:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x40086602, &(0x7f0000000000)) 13:40:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x81, 0x4, 0x7f, 0x0, 0x3440, 0x9112, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000040), 0x5}, 0x811, 0x800, 0x9, 0x1, 0x200, 0x9, 0x3ff, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x1, r1, 0x2) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:40:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x1, 0x13, 0xc, 0x136, &(0x7f00000003c0)}) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:40:15 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1800) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/fib_trie\x00') ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x3c, 0x0, 0x11f, &(0x7f00000003c0)}) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:40:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$dupfd(r0, 0x406, r1) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:40:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) (fail_nth: 92) 13:40:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000040)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000140)={0x5, 0x3f, 0x8}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000000100)={0x1, 0x0, 0x20, 0x13, 0x6d, &(0x7f00000003c0)}) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000180)={0x8000, 0x8, 0x4, 0x3, 0x1, "f5c01b9201ed925600f9fbf563765ffc288892", 0x4, 0x401}) 13:40:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x40087602, &(0x7f0000000000)) 13:40:27 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x2802, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) r4 = signalfd4(r3, &(0x7f0000000140)={[0x8]}, 0x8, 0x80800) ioctl$KDSKBLED(r4, 0x4b65, 0xd4b) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:40:27 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x908}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x10000, 0x0) ioctl$HIDIOCGPHYS(r2, 0x80404812, &(0x7f0000000440)) readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)=""/98, 0x62}, {&(0x7f00000000c0)=""/163, 0xa3}, {&(0x7f0000000180)=""/66, 0x42}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/233, 0xe9}], 0x5) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0xfffffffc}) 13:40:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) creat(&(0x7f0000000040)='./file0\x00', 0x190) 13:40:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) 13:40:27 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0x4008, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) 13:40:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 1420.354883] loop2: detected capacity change from 0 to 4 [ 1420.375684] EXT4-fs (loop2): invalid inodes per group: 0 [ 1420.375684] 13:40:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x401c5820, &(0x7f0000000000)) 13:40:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:40:27 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0x4008, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) 13:40:27 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x1000, 0x0, 0x0, 0xffffffffafa6e5c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:40:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) close(r1) ioctl$TCXONC(r0, 0x540a, 0x1) r2 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="be3b3ddbc4f8f7008178a1c6356d45dcc88224bf083f862a3bfea21cd06731dbe4a105d4951ddf1a3cef83", 0x2b, 0x7}, {&(0x7f0000000140)="45212fae54408f3bcd4919a05f92ab0d0593af9ff0788ae2c9dba9067ad4760cdfdb31b1a64800332201b4b2dc870e5a066012c48652351b68c3553cc75d48d91bb2afec90af1fdc5203132c7e9e64f805046ee6ae590ce32a70f71eef283e65f451227bef9c7ed74f0fedfd7c", 0x6d, 0xb75}], 0x1380000, &(0x7f0000000200)={[{@nouid32}], [{@subj_role={'subj_role', 0x3d, '\''}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@subj_user={'subj_user', 0x3d, '['}}, {@pcr}, {@hash}]}) write$binfmt_script(r2, &(0x7f00000003c0)={'#! ', './file0', [{0x20, '$-z'}], 0xa, "029cc5c11900833815f7a9b171765468d27f956b5001436694740b099b3ccfb88adf08029e28a2c9aee03a8c2cba60518710779b721e14beac47d1a1784d632bf2e477578bd722688d91f07f6ccc95b6c44fe6b5b25d32404fa405e7b5677fc8dee7cb34ecf50c8e66e7668503baa8e1f65e77ef120f788f544882aa91b64bddb9a90f99d7787963ba56ad6897820c5743b06e4990f80283a76d2c08904e4e3854b28eb38918b2ae5514671091a0fe02c13e3364f952730977e53b08f59e7189c5b7636a6a12716fddc55f81323f353ce73e6237b6a7a77584d08e3cd1acf2d6a952bf7fbbd37006d4a27c0e01a16e0da0c7a3283b07985a"}, 0x107) 13:40:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:40:27 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) splice(r1, &(0x7f0000000080)=0x4, 0xffffffffffffffff, &(0x7f00000000c0), 0x1, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) [ 1420.580892] loop2: detected capacity change from 0 to 4 [ 1420.582222] loop3: detected capacity change from 0 to 11 [ 1420.597557] EXT4-fs (loop2): invalid inodes per group: 0 [ 1420.597557] 13:40:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040), 0x6e, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/125, 0x7d}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f00000003c0)=""/149, 0x95}, {&(0x7f00000001c0)=""/50, 0x32}], 0x5, &(0x7f0000000580)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x128}, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000540)={0x8, 0x7}) 13:40:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4020940d, &(0x7f0000000000)) [ 1420.645856] loop3: detected capacity change from 0 to 11 13:40:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:40:27 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'wg2\x00', {0x2, 0x0, @remote}}) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:40:27 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0x4008, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) [ 1420.859242] loop2: detected capacity change from 0 to 4 [ 1420.873628] EXT4-fs (loop2): invalid inodes per group: 0 [ 1420.873628] 13:40:38 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) finit_module(r1, &(0x7f0000000100)=')+-@{\x00', 0x1) read(r1, &(0x7f0000000040)=""/102, 0x66) dup2(r1, r0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:40:38 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x6589}, 0x0, 0x0, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = memfd_secret(0x0) connect$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x1, @none}, 0x3f) connect$bt_l2cap(r3, &(0x7f0000000100)={0x1f, 0x3, @any, 0x800, 0x2}, 0xe) shutdown(r1, 0x1) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x8, @none, 0x5}, 0xe) 13:40:38 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0x4008, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) read(r0, &(0x7f0000000180)=""/109, 0x6d) 13:40:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/241, 0xf1}, {&(0x7f00000002c0)=""/133, 0x85}, {&(0x7f0000000380)=""/142, 0x8e}, {&(0x7f0000000440)=""/75, 0x4b}, {&(0x7f00000004c0)=""/108, 0x6c}, {&(0x7f0000000540)=""/149, 0x95}], 0x6, &(0x7f0000000680)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}, 0x40012000) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7a, 0x3, 0x0, 0x0, 0x0, 0x80000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:40:38 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000040)={0x9, "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"}) 13:40:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:40:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x80045432, &(0x7f0000000000)) 13:40:38 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x10001, 0x4000000}) 13:40:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:40:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x80045440, &(0x7f0000000000)) [ 1431.461694] loop2: detected capacity change from 0 to 4 [ 1431.476978] EXT4-fs (loop2): invalid inodes per group: 0 [ 1431.476978] [ 1431.501927] loop2: detected capacity change from 0 to 4 [ 1431.514028] EXT4-fs (loop2): invalid inodes per group: 0 [ 1431.514028] 13:40:38 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xfa, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:40:38 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000080)) r1 = getpid() pidfd_open(r1, 0x0) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x42908, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, r1, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) r3 = dup(r2) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x7, 0x0, 0x5, 0x4}}) 13:40:48 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:40:48 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) read(r0, &(0x7f0000000180)=""/109, 0x6d) 13:40:48 executing program 3: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) r1 = getpid() ptrace$setregset(0x4205, r1, 0x200, &(0x7f0000000100)={&(0x7f0000000000)="da617da479b5899162459c528e7bd8a77a435c7fd2efd0f0666cbe10266c65041374c3799ab89c8a28eb83f63eced0844270c4610c6e6e3d134f7fd98869c9d32d47b6f6925ccfcbce0f17f33b49287776bec474ce10e77092beee41ca6c757dcbb5fd12497f2b6a80921cb25b496dcdabc61e9c766c88e142db559dd819064ab8bd406d7f14585fedba5abaa02f5fca67fb47061fbc0d245e27d888d8b7aeab63a6721e145ea56c0edfb5775a0172f05bc010bf0992593b0f08eb23f12bdd689d319bf5573128deb536ac8d438eb1064552563292c18a641da6d3acae22dd4cda", 0xe1}) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x88, r2, 0x20, 0x70bd26, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}]}, 0x88}, 0x1, 0x0, 0x0, 0x11}, 0x40081) r3 = getpid() pidfd_open(r3, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xd0, r2, 0x400, 0x70bd29, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4011}, 0x20040010) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r4, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$KDFONTOP_GET(r4, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x6, 0x13, 0x161, &(0x7f00000003c0)}) 13:40:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:40:48 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) close(r1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x100, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804001, 0x0, @perf_bp={0x0}, 0x0, 0x86, 0x0, 0x0, 0x5b0800000001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0xb) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r4, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) mq_notify(r5, &(0x7f00000002c0)={0x0, 0x5, 0x4, @tid=0xffffffffffffffff}) 13:40:48 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x4200, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000003c0)={{0x0, 0x5141, 0x6, 0x81, 0x3, 0xfffffffffffffffe, 0x81, 0xbbd0, 0x6, 0x8, 0x9, 0x0, 0x100000001, 0x9, 0x8000}}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) 13:40:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x80086601, &(0x7f0000000000)) 13:40:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000040)={0xff, "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"}) 13:40:48 executing program 0: io_destroy(0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000300)={0x1, 0x0, 0x1f, 0x11, 0x131, &(0x7f0000001440)}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x140) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) clone3(&(0x7f00000013c0)={0x4000, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0, {0xb}, &(0x7f00000003c0)=""/4096, 0x1000, &(0x7f00000001c0)=""/194, &(0x7f00000002c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x9, 0x5, 0x7f, 0x8, 0x0, 0x0, 0x80, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0xffffffffffffff90, 0x5}, 0x80, 0x0, 0x3, 0x8, 0x4, 0x10000, 0x8, 0x0, 0x1d, 0x0, 0x2}, r1, 0x10, 0xffffffffffffffff, 0x0) 13:40:48 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 1441.089396] loop2: detected capacity change from 0 to 4 [ 1441.104625] EXT4-fs (loop2): invalid inodes per group: 0 [ 1441.104625] [ 1441.125773] loop2: detected capacity change from 0 to 4 [ 1441.131405] EXT4-fs (loop2): invalid inodes per group: 0 [ 1441.131405] 13:40:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x80087601, &(0x7f0000000000)) 13:40:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = fork() perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:40:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:40:48 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) vmsplice(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1406fad7359efb8cef03db30c151d78881ba38968277f6d9850a08eeb8def42344bc43d8d474c9a62341ebccd17f6be2cd2f9606c20b9025eacf969f69bf910b744d6bc7ae52f98632749bda0d14b571", 0x50}, {&(0x7f00000000c0)="1732240aa12263694cd700a9f516213ef498a6e0d49763a0b6c4788811d9f80546fb2c92382290fb60b3fcc05417ecb80171d35a61c4baf15ce0d9dc272befb32dea06f353ab11142ce3f92a7b83595bc9fb136a21210ffbafc8e79dbaef10a980119ffa8e31294e26ef1a66e27cb041eca67abafee54738df0dd8140f2a7326403aec6b22c0a8031c551dd4bb31177133cb165ef7ea", 0x96}], 0x2, 0x4) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCCBRK(r2, 0x5428) 13:40:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x80111500, &(0x7f0000000000)) 13:40:48 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x8, 0x4, 0x8, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) r2 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x7, &(0x7f0000001480)=[{&(0x7f00000003c0)="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", 0x1000, 0x4}, {&(0x7f0000000100)="e5", 0x1, 0x400}, {&(0x7f0000000140)="9537412370b9042e3e91d1660db29f130b5099bd3a76472789af7a8d628b002f6434360cbf58eeae3749dcff8ed31e5a8a456e3ae0275bdc1cae94770fba733308772b8e9c98e93ea2c72f7d6e89684f384d88883932ddbaa39d99b047d4f2bb61", 0x61, 0x3}, {&(0x7f00000001c0)="5479fb231d2e6ff730a26f4702e3ffa9c74e861c8f54d1dce5966428ceceadd6c7e1ef15413aeac0ec9b11bff6e55012a099d4fcc4092b55e0d4128853c70c31327cdbb51ea6049e18630967006da20d676037b60e870e1bc2b14cdcb3d02c05d5ae26af2edb20e2ea50b95015a565fbe2ea536254eeba557e8b2463bb2c2441c39221b1c506b7e4ae372397675502a7a7f3b8fbaace898dc26fed840f9add39659fe79edbc153fe9ce7ca0efdcf9d264b07241f6d6e50f754fc677fb921ba0b8c1acb62bc", 0xc5, 0x3}, {&(0x7f00000002c0)="5ac4361fc4239e6a31c22a0e37da7c8fdefd94ee8c8f7b2b255f5f843117", 0x1e, 0x5}, {&(0x7f0000000300)="dfa594a585b960d67a5592444438f7a03f71652616a7834afcbf9bed8641c67246c3d0734a86a31086cfc8573be235fd39395d041ee8fc6211976fcdbbcbb8", 0x3f, 0xf2}, {&(0x7f00000013c0)="08d4b4cd95b6baa471eced2c5f782c84b9bdd08d07a0f841f745a32a46498ec2113385120b5547e54170f7a0730273cc15b18d7a1b570da0a5a73a8cd22b5dcb9ed46cca4fb62665e770167088d9bae14a66162b3ce174bdbed0c7e598faa91f57db3e31c6c50aa96212292b861fdb1498d63ab087459538b2971b64db960477b770655e744170e5fcd315799510ef66161dc6bd3f3c2800a60c3187f47cb6ba4f4a4d6fd9284f3f", 0xa8, 0x1f}], 0x2008, &(0x7f0000001540)={[{@grpquota}, {@test_dummy_encryption}, {@nobarrier}, {@test_dummy_encryption}], [{@dont_measure}, {@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x30, 0x62, 0x62, 0x36, 0x30, 0x62, 0x65], 0x2d, [0x34, 0x30, 0x38, 0x30], 0x2d, [0x31, 0x34, 0x64, 0x1], 0x2d, [0x32, 0x62, 0x37, 0x32], 0x2d, [0x61, 0x32, 0x34, 0x63, 0x61, 0x62, 0x66, 0x35]}}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@obj_role}, {@subj_role={'subj_role', 0x3d, ']\x00'}}, {@subj_role}]}) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) [ 1441.278093] loop2: detected capacity change from 0 to 4 [ 1441.290326] EXT4-fs (loop2): invalid inodes per group: 0 [ 1441.290326] [ 1441.296097] loop2: detected capacity change from 0 to 4 [ 1441.309156] EXT4-fs (loop2): invalid inodes per group: 0 [ 1441.309156] 13:40:57 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000, 0x400}) 13:40:57 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x202, 0x0, 0x0, 0x0, 0x4, 0x2000000, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r2 = eventfd2(0x0, 0x0) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f00000007c0)=[&(0x7f0000000180)={0x0, 0x0, 0x2, 0x5, 0x0, r2, 0x0}]) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = syz_open_dev$mouse(&(0x7f0000000400), 0x0, 0x0) r6 = openat$hpet(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r7, &(0x7f0000000040)=""/102, 0x66) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r8, &(0x7f0000000040)=""/102, 0x66) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r9, &(0x7f0000000040)=""/102, 0x66) io_submit(0x0, 0x4, &(0x7f00000006c0)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x494, r5, &(0x7f0000000440)="39805bd2f5d5458a33dcbb696a46ea092944198d5e14897d3bdb74ef8beecd4a0f4111e48d3b0113475c613c3e103a1f5be4a02e57549217987607ba1cbf6d", 0x3f, 0x5, 0x0, 0x2}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x1, r6, &(0x7f0000000500)="6adfbd49a1ee4b1cbd2688b2dddafb", 0xf, 0x100000000, 0x0, 0x1, r2}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x8, 0x56af, r7, &(0x7f0000000580)="83b283349abd93e142a986f2079aa9b3f99d8e6bed86b621e1ca0032603b4c60dfda4ab681fb5eaa3c223fe85ed6e6edf6353c868787e291e07e263043fd6d0dce", 0x41, 0x4, 0x0, 0x3, r8}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, &(0x7f0000000640)="5fb738d402c927680b1c911fe73fdb5f1e945a7f9c5326b2cc2f7dafd7", 0x1d, 0xcf, 0x0, 0x3, r9}]) r10 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r11 = openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x100, 0x0) io_submit(r3, 0x4, &(0x7f00000003c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0xfc0, r0, &(0x7f0000000080)="11f8644c6d87d78ac64282256c34d2129a324a2f3b8899913ec7425fd86b7a75cc80fc78b69c1e61401e9cd300779351f37ca23b347a5ebfcea0bc305b188bce34b834950786f80b845dae04c6af537e3945b10f47c30870f9bb9a301c758c097224d8d3dd2738d127091a4110790e9de01a3c7e7d764777be5ebde3aa9c2ff1bf23d31db653e47bc5bf80a557ee8be0d822dabab3c6ceb188d64674406447db243db3acba82", 0xa6, 0x4}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x9, r4, &(0x7f0000000180)="c5a31950a2d1b5d47cd93105adb984398438ddb8ec6b9ed9cc732f", 0x1b, 0x7fffffff, 0x0, 0x1}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x6, 0xb40, r10, &(0x7f0000000200)="589d9ede12ca5a3a71b18f349b9e2587f10a6b31c0fc00000000000000000000000000170000", 0x26, 0x9, 0x0, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x5, 0x8, r0, &(0x7f0000000280)="2fdea6e158978483d5024c6dd51662300a94a61b4b199168ced5731ff2ee3cc95791734b21ccf88d63c175baef6b1b0f3ec2fe738ca5d4748039999163b1bcdaf7994d7012d70b1741eed56902c4ee3c2900d15138f550cd0dfde1d4f3d1b74b09be44bfd7fde23833426f84f765efe0170cc4237a0b13b3b3732a545e1a0bc3f12b7095cf90f1e85d1497fe", 0x8c, 0x8, 0x0, 0x0, r11}]) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r1, 0x1) 13:40:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:40:57 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) read(r0, &(0x7f0000000180)=""/109, 0x6d) 13:40:57 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x47e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:40:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x5, 0x0, 0x4, 0x6, 0x10, "85ef4417a86cf9671926944d05c5eacd0a547e"}) 13:40:57 executing program 1: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, '\x00'}) getrandom(&(0x7f0000000040)=""/183, 0xb7, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x81, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffef, 0x4, @perf_config_ext={0x9, 0x1d}, 0x0, 0x0, 0xfffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:40:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x801c581f, &(0x7f0000000000)) [ 1450.451350] loop2: detected capacity change from 0 to 4 [ 1450.464179] EXT4-fs (loop2): invalid inodes per group: 0 [ 1450.464179] [ 1450.473219] loop2: detected capacity change from 0 to 4 [ 1450.480061] EXT4-fs (loop2): invalid inodes per group: 0 [ 1450.480061] 13:40:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000100)={0x0, 0xcc14, 0x8, 0x1, 0x81, "922f6f6367e002b9aceb97d00b97e8e32380f6", 0xc9, 0x7fffffff}) r1 = signalfd(r0, &(0x7f0000000040)={[0x8]}, 0x8) r2 = dup3(r1, r0, 0x0) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f00000001c0)={0x0, 0x1, 0x11, 0xf, 0xff, &(0x7f00000007c0)="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"}) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000080)={0x1, 0x0, 0x8, 0x19, 0x19f, &(0x7f00000003c0)}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f00000000c0)={0x101, 0x8, 0x1266, 0xa74, 0xbc, 0x5}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x16d}}, './file0\x00'}) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000180)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:40:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:40:57 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000300)=""/102400, 0x19000) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) sendmsg$BATADV_CMD_TP_METER_CANCEL(r2, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0xb8799680965e8e2f}, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r3, 0x4b45, &(0x7f0000000000)={0x1000}) r4 = fcntl$getown(r1, 0x9) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x9, 0x8c, 0x5, 0x0, 0x0, 0x4c, 0xc40, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x7, 0x100000000}, 0x9800, 0x1, 0x7f, 0x6, 0x8, 0x3, 0x2, 0x0, 0x4}, r4, 0xffffffffffffffff, r5, 0x2) 13:40:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x80811501, &(0x7f0000000000)) 13:40:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) readahead(r0, 0x40, 0x9de) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) [ 1450.586091] loop2: detected capacity change from 0 to 4 13:40:57 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:40:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x410100, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x6800, 0x0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000180)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) r3 = accept4$bt_l2cap(r1, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x40800) fcntl$setflags(r3, 0x2, 0x1) [ 1450.610394] EXT4-fs (loop2): invalid inodes per group: 0 [ 1450.610394] 13:40:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:40:57 executing program 1: shmat(0xffffffffffffffff, &(0x7f0000ffe000/0x1000)=nil, 0x2000) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) [ 1450.703993] loop2: detected capacity change from 0 to 4 [ 1450.709089] EXT4-fs (loop2): invalid inodes per group: 0 [ 1450.709089] [ 1450.721799] loop2: detected capacity change from 0 to 4 [ 1450.726291] EXT4-fs (loop2): invalid inodes per group: 0 [ 1450.726291] 13:41:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:41:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x571, 0x683, 0x30ca, 0x6, 0x9, "d4ca8419f08ccb74a809f6dc5515d0ae5fc060", 0x7}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:41:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f0000000040)={0x2, 0x1, 0x20, 0xc, 0xfb, &(0x7f00000003c0)="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"}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:41:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x440441, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x8, 0x20, 0x6, 0xff, 0x0, 0x5, 0x8824, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x7, 0x3}, 0x1, 0x2, 0x4, 0x2, 0xffffffffffffff7b, 0x6, 0x7, 0x0, 0x1, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x2, 0x9, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000000080), 0xa}, 0x240, 0x1, 0x8, 0x8, 0x5, 0x8, 0x1, 0x0, 0xe81, 0x0, 0xd35}, 0x0, 0x6, r0, 0xe) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) bind$bt_l2cap(r0, &(0x7f0000000200)={0x1f, 0x80, @any, 0x9}, 0xe) shutdown(r1, 0x1) 13:41:07 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) read(r0, &(0x7f0000000180)=""/109, 0x6d) 13:41:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) 13:41:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0xc0045878, &(0x7f0000000000)) 13:41:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7d, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000040)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$mouse(&(0x7f00000002c0), 0xfe, 0x70c4bf4fb520ac03) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000300)) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f00000003c0)={{r1}, r2, 0xe, @inherit={0x78, &(0x7f00000013c0)=ANY=[@ANYBLOB="00000000000000ffffffffffb7c90cbc38c9ee8263f4f5a8203a1e0200eb0b00000231000000000000000100000000000000fc00000000000000040000000000000021f40000000000007b020000000000008b00000000000000fcffffffffffffff340000350902845311ad9ab571562ac80b2ea0f8cb8a249de017ee3efa409c10656feb730331ccc80a865ee632aad9d01bc06af2ee67c86ac227fa0e0364687f699315aea76ae2a31b758f9ed915cf172f0a959253b039a637c99943fee4096af06efc204bce59a19a"]}, @devid}) 13:41:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) [ 1460.087283] loop2: detected capacity change from 0 to 4 13:41:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xff}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x101, 0x40, 0x6}) 13:41:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0xc0045878, &(0x7f0000000000)) [ 1460.108260] EXT4-fs (loop2): invalid inodes per group: 0 [ 1460.108260] 13:41:07 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) read(r0, &(0x7f0000000180)=""/109, 0x6d) [ 1460.131758] loop2: detected capacity change from 0 to 4 [ 1460.146884] EXT4-fs (loop2): invalid inodes per group: 0 [ 1460.146884] 13:41:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r1 = getpid() pidfd_open(r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x8, 0x7, 0x4e, 0x1f, 0x0, 0x2d0a068d, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000040), 0x4}, 0x10d1, 0x6d7ec14f, 0x5, 0x8, 0xea71, 0xab, 0x7ff, 0x0, 0x10000, 0x0, 0x7}, r1, 0xc, r2, 0x8) 13:41:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0xc0189436, &(0x7f0000000000)) 13:41:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000080)={0x1, 0x0, 0x10, 0x1c, 0x6c, &(0x7f00000003c0)}) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:41:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x2000) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {r2}}, './file0\x00'}) [ 1462.932606] Bluetooth: hci1: command 0x0405 tx timeout 13:41:17 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) read(r0, &(0x7f0000000180)=""/109, 0x6d) 13:41:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:41:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x8, 0x9, 0x7, 0xbe, 0x0, 0x4, 0x10020, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x0, @perf_config_ext={0x3, 0x1ff}, 0xb412, 0x2, 0x9, 0x9, 0x8fa, 0x4, 0x200, 0x0, 0x9, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) readahead(r1, 0x8, 0x3) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:41:17 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0xc020660b, &(0x7f0000000000)) 13:41:17 executing program 7: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x5, 0x355daae1a7df4cf2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) ioctl$KDSETMODE(r2, 0x4b3a, 0x1) 13:41:17 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:41:17 executing program 1: seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000080)={0x9, 0x2}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:41:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) fork() [ 1470.845873] audit: type=1326 audit(1758721277.883:20): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11908 comm="syz-executor.1" exe="/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f244c792b19 code=0x0 13:41:17 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x60040, 0x0) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000000, 0xfffffffffffffffd}}, 0x0, 0x0, r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) signalfd4(r2, &(0x7f0000000080)={[0xff]}, 0x8, 0x800) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:41:17 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0xbd9) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000040)={0xf8, "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"}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) [ 1470.885994] loop2: detected capacity change from 0 to 4 13:41:17 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) [ 1470.905752] EXT4-fs (loop2): invalid inodes per group: 0 [ 1470.905752] [ 1470.928314] loop2: detected capacity change from 0 to 4 [ 1470.943950] EXT4-fs (loop2): invalid inodes per group: 0 [ 1470.943950] 13:41:17 executing program 6: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) 13:41:18 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0x1000000}) 13:41:18 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x1, 0x16, 0xa, 0x13c, &(0x7f00000003c0)}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:41:18 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = mq_open(&(0x7f0000000040)='}{^\x00', 0x1, 0x85, &(0x7f0000000080)={0x400000000000000, 0xfffffffffffffffc, 0x6, 0x4}) read(r1, &(0x7f00000000c0)=""/126, 0x7e) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:41:18 executing program 3: r0 = clone3(&(0x7f0000000280)={0x90200100, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x15}, &(0x7f0000000100)=""/201, 0xc9, &(0x7f0000000200), &(0x7f0000000240)=[0x0], 0x1}, 0x58) r1 = getpid() r2 = pidfd_open(r1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) pidfd_getfd(r3, r2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r5 = accept$inet6(r3, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000003c0)=0x1c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000400)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) read(r4, &(0x7f0000000040)=""/102, 0x66) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x6803, 0x10) read(r6, &(0x7f0000000040)=""/102, 0x66) kcmp(r0, r1, 0x0, r4, r6) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9fde}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r7, 0x4b52, &(0x7f0000000000)={0x1000}) 13:41:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:41:18 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0xfdfdffff}) 13:41:18 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)=0x5) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'bridge0\x00'}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)) [ 1471.130205] loop2: detected capacity change from 0 to 4 [ 1471.143908] EXT4-fs (loop2): invalid inodes per group: 0 [ 1471.143908] [ 1471.676598] audit: type=1326 audit(1758721278.714:21): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11908 comm="syz-executor.1" exe="/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f244c792b19 code=0x0 13:41:29 executing program 6: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) 13:41:29 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) mknodat$loop(r2, &(0x7f00000001c0)='./file0\x00', 0x6000, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:41:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x61c}, 0x0, 0x800, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000080)) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:41:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080)=0x6, &(0x7f00000000c0)=0x4) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) 13:41:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:41:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000000c0)=0x9228, 0x7) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)=0x9) r3 = eventfd(0x1) fcntl$addseals(r3, 0x409, 0x6) 13:41:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) r4 = socket$packet(0x11, 0x2, 0x300) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/102, 0x66) io_submit(0x0, 0x3, &(0x7f0000000300)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x1, r2, &(0x7f0000000040)="ee35824e8773871a4fcc96bdb102e5b8b5dac627c3b6f3dfc77768cd5c04b413f673f0fa674ce41e2224144bcdf4543d0d2049a5478ecbfb1ae68f7657a1c55aec1056e4b8b1c5b5df8ee4d54c838bfbb4e446c2532c0ea34086374583d094bfc9dfa8867a6ac032e30b36c89b4dbf9bd4e1c478a6f2752a6aec5aee3fc752dba9806062e94161bb8484c1405ee9e044c2d125d4844b25916f983f3d5865045fd1bd171f96ee70b199def65fec0e52231365d47e928ade15a793f913c1f45f6de241973b", 0xc4, 0x5, 0x0, 0x3}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x2, r1, &(0x7f0000000180)="554cc179e8a5a2fa295941550cc3d9b1ccad513f0983daf35ede2b836ffbdba49e68ac4efa7005b64da2aaa4d3736d5c4be983984f3b6f5e21de2d2bfc34522769b98f7d6f66eed26707102f9ac38a6a312281a15f557d543188499362f2b2612e86f65d83073da863512b0f2551991a69d5a30f5df3c05ed53446f1de6b1c324c12145c48e42fc86dc4cf3c914a637678682bd49c9bdb2feec846a18a21e2a38b455a9a44c55480da075915df576f5b2a793d7f59de5f4c932d6531feb85c4ffdf3bc31f250dff3ad4eb07087af27", 0xcf, 0x7fffffff, 0x0, 0x1, r3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xc, 0x3, r4, &(0x7f00000003c0)="fed6f935186b4ce544510b269399b7b864ea866c32825912868c9d0ead71adbedbee614b5d75c11c29e102e1b50ed2ec56204a609e036624bb4c77649402902a2afcbe0105b4167b3b89e756b2fac5124a6f51a183647dff97ce89c8d0dc5c3d663c2462a20ec8b5ac84d575aeeef517298cdb6b681f647120c9f057dae5d1e83c520c9b486809436ceeb32a6fd9514f5c8faf7647e2137088508d2960446ff709d2c8a9ce4e71d1f30838cd9e9944417e7304cf2fc25fa74c7e9f29f22cf8bdeacada1631e7f5fbaac79a4b453007205c620655815694358ca047f89f007b148e1c5c890e7eb588b788522f6c9cc90ab5660b63ad573eb4e04da87426e5499af88c0a1d448b48bbb0b216b625f5fd78c8c8af404032680e150c4db84c02dfe942fc3fb3e2b12a456d8da6ec1ff7f793fec82fe0dcafe6c80256df131dd91304c13db05ca9837dedaff0c30eced3ce3436af4557637f0d400dcf490fc36ecc5f1e2a33720bdbcf6fea148abeecc8589af38448ffb545e54bb948c29cf4634634ef1588f6980d3add07614275426e01d1637dcc17df8fc03f7293ee5f8fd5b6d3752e735c60fe37749dbcc157d84444910296d4d3a915abc19a453b56b35de4fc43a6b4a3773038a739ecd1c369000546aa2ff9ac8fe0894930114d454b7adaa12573a6ec33597c2095db657fa9966546fa37cd4f592fd1d71edc4a16bdede89187e761b635b53966979a2ca8629d4a17ecaad300caa0ccfeac480a0cedeedd11c9e2dd91c0c29dc7f045c350e74c943f1516e49de825f8166037e9a5e64ca7dbd0eb38027a9fbea2afb96afe7e499d50bc8ac77e0237735b34ba3fd43ff39ecc0b30e55dc3b064529218f5dda87a263049a49666f565ed56fc872237309a87348855d0a57576610f2dbc2a78abc74f9c54397526faff31f62a7fc5d678d2982bce217fd2ccf50bfcc95aeaa05a55e70142c6d0f6c0ddfecf43268592343582abcd26f976e171cb57456fbaea45a9740d881f121cc2dca258702944aba93be94299b7ca42149824f638e33cbc1e9dc93731d5eaeecf47c904702205c6c3188e6e19c3e09b9dcb00c5e057a9e9af012f67048bb69079945d86e537c31ed55b5b35e2c7c004e7c09b77c646934f3df40f3a73d0375fe754f82a67383e62506261225b729ff21b9daeaf9eb3675642b0575d41db4ee65ab9539eef572d91e3c8e395dcc6a80b094bf3240d4b7164ca3c6b6694bb7025902cbe795edfd142df8864692d895779171faa5be3a274412f272d86fcb735ac555c3e63650dcf4751becb11da05951faa78ece0e6ed8d94a94607cfda1479e351da3618cb1269ad0e27b4052b7639dbd28f4de9e3cde4725b8dcf76301626aebbc7bd84a0080caf4d8cdd63221116ab29fcb9aab9b29f8619aa0d4cc065cfaad2d5d7978a2643cc91d5703e66a4314bed06bb66c1327ade0b08aa9005ed9689b1498c9a0a1bae5d4693fe730db82f2ec1b13c9673b7fb2d1fdaa10565dc734fe57109cc88138cdec9179635ad1abd6bb864758d06cdb8e7f9b5a95c5929c1f922ec75cc8be9c924432a41de44a292839b9420eb381b008f2e2edfd03fafc772abd649a06c17585e52a74d3549724c30e82df3afbf212fb88e73c87a7f1227409f0f350a92cd485b8ed602fe7135bab04b13feed1dd00b4e91ef0f879ba18398571ed3219b25c2cc87481313ffbf713c93b52cc831c0f012283558fea9c2dc2e41bfe649710604150ce2c158cc00bc9b251dd7ea40ca81b7769d28329d983710aa5af2e3297f891759b2d6db6e3f389ba0ded1a1f174c79e2178d6b304369bf229ebd6fe8d46c4af138db478b7ff6478fb7ca1d20ac505f406bba1869220d4f10a6309acc0b762a569081d3abc301f88e80a6741b0c5cfab7c934ec70a98088db28169e6b00b937c008724c21f3ac55fc423b1562434d279267291456afb330b18f91b0622fc3ad6ea8963c19700b4ae33474d10e7ff67955362e1c10580d13485e0585ae8fd83801bef9623ec1f0542de4dbed4bef9238a0be53344dabf1c156a9fb1ed454a61ef167585eb4e43ad8de34a42e06c0d8a8c09f3afa8ce70e50268522f8aa80202d09a8d9e8688013bf34eeb1ac9ece647333c3a68be1001ac11f864813df71012d37642ae033733b7e288963bd9d1b714335e6082b0efe7228975d6f79db35a22d6c6d57e02293e126d8176d4b9cc72b81f3ce304e48edeae2040b90142db17755380e41fc497a9cbfeeec30ec25f5f3e7c4f7654dda08bdaf15dc0a1f168f3916181ecd1b46c3ce3f6946ee82a182be99e85aa182ab0b5c476a951bebc72d292190c24e59ffd9929f4bc548f8fbd1d2a59b08c8ec99d0a509a203c13d62373de31ace9978fdcc3ec8a98fa6e5e28a1e47d36c44bf04dae18272f541a4abd871e66b54cc378e66c43b7a98b8aea0946da8f1df645c49b15b659642cebaef7c46bdc345728f81a1ba0cd2f5b02eeacd8ba914462071d98af42da0384f5ad973541d60a3f38d9f4cab2f824f6529e0d035fa3c285c94aa5bbcb0e005bb7d7ff94849c7b717482706123b53fa19f285ea46d4a0b1ed328c4066c532d68c045bfd087c502fd3cd0e54a7ad33e17a3420d5cceebf0a916bc5ccfb97559e0a73742e977972f2552c21cd8277bd02f6192652f92b2da57a0d6eb072e0ce16a6d7570dddafd2c3923d029142ebff24b23c88278c699d4aeab78bfd28a3358c6014f4620c29361cec74bf9bc9338a4877ec39cf31f5ac4fbb1a227e5509f0b02e01e69bc1de5045a876a2a120edd4ae1aa3e7f900044d946922d731a775bb0c491ade7431cc51981b7dcc550c4e9a0b23dd2ad5f5abf3f16192d79ec4f26ae88b6eaeb3058d680da86f33d9df12028c158b3a7bac04dbb3d83129910e01c98d6e497e96ef275184771188e5248ae59423b24e489208e8f2b1942f256638c086e2c472b617407d8a9a45c2a00f9bb3e4831ad2b0704c3ff6abc4cd2915c7237bf549b531f2f452e9eac4eef13b1420c95ba79ee561cd5f8b2d642a93f629c51c7cd15ed87065888585aca14fd75b083b62439e729fd16e0301eb1aed7346e78f48dffdff7cb477df37243218bd178f7668960af849d120ab5ab67d7d3aef1f94579e7b72d55a04796b01dde0bdbe40df32cf94a535ba2901d853720ef88b72f089e1c1111a90d69bfe690c79d0e34af40544ecb119ccd51a84a55e716eae426b38961468c9106a8d6a5f5f06677e8201ce6df8bd0ad8f9acccbd4a256c42175420b163bc621759a7eb66a7fdcc889a823c1edddc4fe0f6b5e0c0c2d44acacdb44f133e9506654e5b723345e932393e80a5cd820e6f2b86adfc73c0b6cdbfc3f34f6c8e26ddd0e023744b017848a8168895e619eb2c3f2cbf8e95109bb22b29ec46cba0d72f297476c3447a3cdf5a13ef0f02bb95ad211775c811fd08151a21844fce30a6eeeff141c0103fc29ab72851c379a5baee3bbf094b0ce13db012a599f9ecb4a271ccc385d78c840fe4e7f215ad8df1749e02ff8e76c9c250d18bd4e7b699dd6245087dcb3edae4b4eaf7b0253d12094d8aa7ebb1437a66351d067fab0909a6f8ea5fd9b18f343127a4e8e6ca577255465e656025a79cddb410582ea013a4f9ba9b6b1ea2236f6e6b0330f021f808ba73b0afabc2cac2984f737784e39d0a831f9891791233bd25cf22e4c5f18179f93430fa56bffe59d20adb9d11b9ef5480879bc7393f1d304dafd8d03be98e89d83a2ba994c864addc0f7a122574d2147d09028dc3a3c1077a452697cf5dae951442e0081c360af269d0759fd0f6a381b8c2d62aabb1bb8ab1fc93c8feb4af128eb0f32ed69d069d394589be232dab88aba8bf4115a9ce3a0e2c51d0dbf14198c2166fc147f0f9f2207a29ba046ee6fc5661da2698852b181999abd9b7372b450c6d33b30b8fa659c8680bd28709052b0175f1f28712d58593134cac8ce84113f1f0ca1afb34680cb17c16c48d4e58c2e53aa062decb37758d8b625137616fb85a2f64c46cf6f5957e56f676318a03b929c514973b9a2bc73c6932be6b9a2889cb9cdc6dbc0db7822e846d75400e8795d2b244ab87c10f5d6039796daee027d8118b508573f5ec5755a9f1e0245caaf2363a418541802f0c9b988804945193bfe0ccfa0933a46493ebb50ff44c1e60ed2a2aa82e639e6940db9c19b42086c4358017fe6cc8a8258c418fbc67cc4e113d495c91d3425ad8080581fd9046c903c563c7d7dbf0943eeec5b0477bbd12cce26ff14fe4380b35743effc43d991361a291f392e19c509728103eb3cd6e06f56bfbeb5d34f4dbafd61c531f34244a72aad5ffb1b0fbd22fc6b34325f24686c4f5b673bd9d90c2b0fc0c965408da2acc4a37833d9fe14594f9c65f073748ee0b4d2a9f37e28f9bc1da5a694eb6ab6e9c1d06a47cf0588f1481fc597fa2696493df72a5fcb61f4b31f8b9d37d543f9770dcec3117a4d12f6ded017081a80db2951192ace67f2797654ab258eae2121c655565f6e9ed481c42c74c1f001cf8316c16cf895e731b77618a530e99d5e5dd885a116b250ede61e84b5bb7393b7e0fdb44bd1bdf279be5e8733c1a5fe8515ad7f967750626aba708b4077f94131518dd80de76459b7fb1aba933ec4806d95bb7e13540095c1a42fd9f54a49fa5344c952a75682e4ea357eb5914b407b2720d19842cef0a23c1fb68d92b96013261dfc31e439530d76aba0c2de3051401e3881f971c1634f58e9ab4e16636506867c12722bc11b9c6251c6dbe936238ce7e643307aa6e42436225f59a32663bc5bfa089ad930896f4032e04a7a549060c8aaa7895d03cc0e7fa8747f364c097fa92886a66078c93e67008a4eb6873d1b9197d7aef40f76153661d3cd391b8df1c7c25d59f2a7a9e258763d38f308ecd7ba720bb27b3abf71a70d2f9801ec073e9d46d636b1c6616bcdfedbf5874d514d82b95e7fcd01d91531d883d3e2d2e0a7444fc4d1e23a8fa47a6dab3a44c8f843874a8c8ce4dc87f894fe445876e33d094253a38d20bed7e7cfa8393d93b6e68b02c0882253263d4e6f6d8e42cd8c12bc3f0933a62d0bec25c8eaa037e5b1936580b659536e62b71216b99a8c1de3a80d124b07a8f885c0a7d00b40ee3e13a63f97bd963b9264f034626cc347ded473f96c563d02ef2f793471f01fc01ed519a6010225b6fad44c992c632f4c7facb3b4c835fa03f098dda51babb835499c8c972155ed2a1e9452c853c04f26b4a7fab1aa714ba957e88d9e0ff37f7873ce06f7a7b1832ec33976ae6b4abf5dfe8b02136d04af02ddda0621655b2cbb3638c24b381553a5f9c241ae7ec4dcac0c9068d229ab0b78a99c69cb8ea72c2ff9708102c90ba51a3051d963253f9a1ffb35cac8c69d0bf9857ac4b8af0a17ea8960819b661ad945a4d30fc5cdee2ceff8064a9d6c0074d3f31119b70ccdf4c104738b97d1ec88ca1d7e6d57e03876e1afdff2c4b60e8f673ad2bc6f0e31742dcbe26415a3cdc91afcf91b814c00e53539870dfa8361103e921449da6ae12155931e4f9b193eef7fd1e0d2b654287eb27a7fe93fc3fe340aef4de1c244cd250d7cd0ecd2ed4a2e6cc454e8358fc7f9cf98aea2131334c718eb3931b419199b385dd734e198eda2c6503c0cc4c16e4d239ed68a61f2b04b5c5e4da9b7e14b9439b28feccbbd158e0c06a9e985cadada620740b76b73bebbb41dc301a8af081393334aacfa690059008720b1a02d6175664a866248c4276497c2da3332da63788e27", 0x1000, 0x4, 0x0, 0x4, r5}]) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:41:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0xfffffdfd}) [ 1482.459796] loop2: detected capacity change from 0 to 4 [ 1482.489718] EXT4-fs (loop2): invalid inodes per group: 0 [ 1482.489718] [ 1482.513831] loop2: detected capacity change from 0 to 4 [ 1482.533348] EXT4-fs (loop2): invalid inodes per group: 0 [ 1482.533348] 13:41:29 executing program 6: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) 13:41:29 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000003c0)="f02f76c55e1bf90f484da739a1cb901e248a761bf17da9a909919127e103eba4bd41e662d26ab33f057f53010af52b852861b236af69464442308f8d74463e46d11b33366726a232e93e4f897b69c13f5a53087a9a4f09433ecad724ae5275095e6c00eb210d0fabe6e2ab788950d6f624287ea4d2917b8988dcdf625b57d810456ec222fde7df31cfad68deba4f56361a484137e7003ac7722ab72736f72205ceb1b927593a44772bc8bbe21ac3dc624705b2db109e3080c64bf48af93c2e796465767f45e168833f7586db0894fd2ad7b5c55c341596f09090302df1365a5b873ee489ba85ab7d241d046abe28262d75960fea5d25b4ff00c5706391e55aece52ce8ade4fc866ab0dfb6f308f92b7026900eb0229442358d1c139e7e9a45941856972bfbf1ff1c34dc9075ab9a81319be67fdb5915508a9d99efa67dbc5fa5d6ab2c397abe164b27598eaf615cf4e761b977da1f9ee40b71ae5cbfe45d602fa325da8a110dc3c7224d088d6448716491a8577cc926e92688e7552a525268bae7ea2a19147c23b47a3d1a6d7d91be9d335a3dd5e420452f8c8a775aee4bfd06f4f8c8d50ee89414b76fc0c4c5569ce2ccf20d6fa852fccc312d09dd2d95b3b8bbdedd16f50a915d44ead1f8bd88c35ed27b70ac35670fb786fbb1178620fb272065ac35020548a2d32da8f5e38805fa070011c29b9b94e8d939ab457bc0e1a0988f3abb1243fb84f404a4f732cd688134259d16cd47dddc1f2f4d875e0a1d648c7f72d57a568fe84f116c01c52c8ce7606fc0010bb69e479b6a208dbf41b7ce9f7c7df198b0cc4af33ec16806f92054d64b01b642eafcf69d0440a0ef5b12e517d87fd5f619ad2c5919e7fd8b747c84ba1941cc08bab7cd58b475e99050ed2ea5770b29e77c66efa5dce960207dd8911b9921da835bc066e50acb8fb4bcd790b86791a4fc86522f6ddc14f2c3af8a585afd726225172cd2df8e946e163a60fa4fcdde2f7db8fee3aedca6932e038cd7e03982afa770931a3a244d2d4f969908cd959e6d931598df64efd96b66dc561670619c94353dccbacc8a54dfec068ed3acc1286bfde012bfb0951cc608582328a54a6a4a5943c4c1cfe98f9d346047cce6aaa4e2f835cb1d52a60b561b5c35f51952dba6ea104720797f3e5d372088142544f87a86b734c264a0d5dfb6e56f2c64af66da174db0cd0f64a2524e60e50581bff9e6b2c855acd553f8489a1acc39752688a26a384e3b486db76598d00995db51443cbe07d7eca9e9292083118189152553643f370604889482661c7f22ae3d48d39b9899a7e8bf73ba2ceca8a339492f41b042e091c3ddca9bf95024df2e7e34878470e8de4e1fe71bf8b7889ff1a3a749a75667de87ca0407f8e697be73c20a52972ccb250d585592cbbf0e33cc620a6a828dd945246adc4ac7b664e34b0f3937aa7dc952842a8d4f1a3688e95ac5ba30d1bdf9ac43edba73495bbc10de0782606055eba008aca1e14c26f7bf19485657da4907ed521803be91771784555ac687deac33b31a4d217421e63c1b8f15370794161aa00efc10e550a0988507bc9f6b791e12d2a4d1b45cd420b6e11a2a1fd5c62e90a474dc23da5753b77f58b8e7fb02f9fa209d4cb46e7d9125b76a059b5350f35c4e7356c977e9613be021059216ec150b82fa434afd885f3dd4f9fa3efe1585948f44edff13a988fe8ebb12c90538caf00cebdcc4c8266ecca89948bf01903e27b5370394d0ab49a5b64569aed03024bd568463b3642875be28d90de4e5d6f3ed310b1823e44687969eeb33f4af6609df08b2007ecf0e7741bd3d48819c5cc2a99c3112bffc665596833927a3eaad89bcdd5a20934da14de794f0178a3208d0e806da2cf9cf31e2bf008dafe7c4ebf0e1e75241f26f246ecd2ef5b6f65abc1c79ee7fa5a10161287410c8503ea2047528da50a319d6eda9c3c12b5127eac4bde2d4a28d615291356783c7c5cf01cdfcf9aef71be77af6b388ac98ab948ee613401a9a1c8a12a59e1939ddaffe16da08271fb3132ba82dced16744d06c6d2d39c6d8925fe59d4ce9454256b8f325b1ddda406598e548adc4543803e19b6b7070182b5458942960f6786183eb8cfcbf9716135f202db554bdca2ecb6abd130f682bc2df19e61a81a8986c6621e07f7d6f9bd6f17ed250d0ef2bd0e81b75a5f2469ba3e57d9c781f32566f3b71d0060c45a0f8bc182db7b3eef48827e0704b41146843a85f278b34380b5b57fb6a225fd3f6f65f30bfc48e3f158c6398196a51c43506512e8bb9258951183d2eeea1d8866ffd190df4bb37ea11cfd682810f60fe216cc80b176232aabaa1c8aeb2873fb05deb80436fad7888f481cc1e1ca94bd5e94bc7fad978f20e37dd065e32733a19c65b67bb91acf9e2baa94f14b6922cf4a8351bc3f97c48c553d823e43ce68c400b6aaa47bbbabd02ca5f6d758db95342824f1d89733c9b6543adf1ebdc9e646a91b57709c611bb86aee2661f3eddef1be5896a289716178f9deb345e81a9291bea250529176f7abe7d9166a420f60512ffdfc3f1927cd8cf7de6e3b121ad6fe3528680aa45c2e6ecdaf0b7fb73604434fad8fb51e9d90059a43af2d5b1a16ffe6beda75cc35001f261e4683be040154c05010e8214054c25dd01c057487f7331cde807d0fd993167468e61bfca4a638123a00fd8095b10ce6e4af6796d2e991cdb7c8c5b58b8b0193eabb953e0ba5728b738187a13a09038888230b3e208992dbc3b8db969fee6c03d2c94fdb9ef90b308460008bdf3d46df282fa8db6bb0755cff9d93499e7250b877f2a4bcf01a36f14adf80b994cef258692253c775bb64cf0796a04046aef2412dc58857ac3b1a5842bd2021c6cb0d5c08b92643518e6173a999d96d1c5e4e8f7e2bca1cbaee3eff37d85eac76358c001d34a5acad2d3e0536478a83940402d0781c77e1c911e870fa7de14d3a6b95f4d5edb44f732f75b4859f929063d96cb8770a5afe9c1099bc14a068e7644f8995fc70649ba5eb0b022f680e0d3e5f477f6c51d35fc3ac60ed5b365a3481dcc87d6810031c5d68f037adfb93c90bd490557952b67c5ae42026084dbb4e78cf1bb7595a623753f8e4e1e1668d73fa1dfa6c4eb1a4a1d34ccce340d6a18738f8737d87a5b829e9176ffb02153f5c4f5dee63dc8047b9d16ba29c19704f097cc91e0ad4f2ddcd20eb1015a95f167b912d5e4a753b142e6c3309f98b774437cf6792702183a8bf9b4dd7800ebe764ae164e6a7e0f9f48f7620d8e4c565c9612198b38c11bc7f88758eeef5a9dc440a5846622206f49d8141d15562f70eeece4d5a684daf86ca41d81fbb03d86b1a5268f2c6741b47d1a22e74edde4b282913f1ecd34b7bcce265912dcf4c1c6741efdf103752bc66c273fc071af90e5e7135cacb4725ed9763ee36b1d1894555daa662f09a6778e7d73910a0b8adc7630a2169116ee404a6adc0835adaef007e09e05e87f53a0ded087648a8c944f2d997ddc8bc7bca8844362ca91669ab63bde68b2a4f7cec63a3a25cd0113999fc0f95d50d5c34c31334271a9373396a54ef35da947e6d08b66a20e9729366939720f05084a4a5e66d806934a7ff0ecdb2571de4163b6b6549616f47a8968e5be01f4a557838441ec799d5604ffb7dd88268bf67d382512b7eb6696f92bc7039d52a95d8d94aaedb545acc133ca6a06d09a74f256d4f9b860337ee667ce2680dc0f89ce11d664ecf2d319b33308ff8876824853562406c416735d9ad53c02cf7146b13b8155b10549752036fa13a0c514098e21539dd9bcf3265893cf02f32cc0736931511f8e570553d275a6896553e4d59f36dfad5c9e5ee5f9549d11d06ef8f69556e3fd82de1aa6288be6143aae8bd00d6c62d103bd81c5ba3f9d909f3b4e1bdf27857f2ccd4fc66bfffb5d058d7858fd8a1a9ada1be15c9a0820ec39931a8003daea9a035b65318a184d2678557fa24a4ea7e7f00f4a812224c8164e25fa453ee46dc99b8f30af19b585f089190712f6b99a3669c10af1f43a6dbe2979758d1622c30f18d362e5c738a4ab2c21988eba62706378524066879284636a02bd44def1e8cffbfcd19bbe779b4546276cc47437e46041e3fc921c111541964cdfd3195b6de25cc7e0de6ce5f2c32c5c6d358756c0e778d174924e34540f6acf3502f572f6fa22b3b55fca7514cbb330b372188fc17d87d00b836ef45cf4664a066766de55ade1145a2c0c5366790592356c149348e772ada486ce674b57c4cb9472e36a1817436197f8039dabbba83490acc645568e26a35ccc39fd0907e7e204a8fb131b30881b654c39a33dcd9a299bfa1f08c269eda33936b9efa2dabac782182027d96ea499948de4edb52eb10461d8aef188649761c96ad4e6b7988a28d9016f468e5e829bf44d639e71a055cec869eabf6aa9dfa33905f35f62db146694a793c2acbbc2df2a46fad111755045282f2220549e855092e78f3801042a05286069ccbb68a22d5c99e82110cd1f1f726aca979493f414b246746610b9c6c9af169315eb6bd42e17205381ffbe153a6aaaf44b47f0b282e6344632443b4b8f403d402a66266a79a42436a1fd5c7dddcd4fbbbc035b71f887b7c7e190684977d8e6a896e9f9ecbb23c5bdc87beb1cd8d423943608f2d43687ef8bd3a09ee869a7f9dd1865e5e62bf72f41e0876f5accb7a3dfdac078cee6015fa0d6b50e3c9320315103054447084a62c29f03dd894597908583f8dc2c255e4ecd817d556aff2040ff3370b432e727356ad043bc260281d68b89e1687963f88f55838aab346f4fcb43d45a6d0445d5c41d4185da319409dff53aaa9dca0c604d6bc2e85f9a4a8b671390e9f02db6ffac9c14298a1e32171e1904022429ac1f51d456e0394795ac888d8da6ad6656f97a7e18123ddb5f576978037863bd14949eb2d7e469c1d37f489cdc1b43ec831da4abe2778b62b754b474258ba709660cc1354ce394a85cb1e6aa289e602351d6f49db9a5bcc4b6ac603d687e62cb604e71f911d8e5bb52dac9958b302aa58a965265a09f53cf9cdbc0899f95ecb5f1ae65239ed4eeba60331d823488a28c29130db20650bba0710035c599ea78f2ec8f18c90df7c8a81eb87bfb9e9a3c3ec31e62ec783d2689faabe78656c296588eb4613374d72b9f2aab7ceaa6ba6984deb03132935125d5d06a6fd4063e47103e7b8fb3bf1b3fa2b4ad2906cfa94e365e9a443b21f19a64fb2339589bf58151f721d49353adb3b3f7338665a76284c01efa82ef45f635080ffe9748f8368551a05cecd9e1f426a47006eb2c25be3b42e85b8f70c44c34afea02a268f17ba0937f6badddade6a2918a18be81308e2dd466fff5e2461902b31ac77c7d3fbc9374d6984a5bad736c8573cc3f7528d35290e281a1f2f9d0ed2025fdce15dd7be3ac8cbedc85aadceae310d91cebefc500665916e50721fb51cb87afeeda8590f99a14e1dbef426f99327958a8cbae93d63416b14ce145f914a07d414cb103906f72c5b3aa368c17258f31f489ffeb3ba8c250bdf641bae331f756ce8b57aa1f8850853e5008e8a28eb8f601bb72da4b864f5aa03d2fb79da4853a4432acffacd57495ad67c5b8765b9a843b236dc9502768782c8ba5d710d4b635cebe104610dbe8b8ad500679f12aa558db416ca2663bcb2764792e5ebb26bbad4ffc26d6c38947a236c7525823e67f3a51153252e1a957932b07c2073704d4a8a932c28354b7daf4b7d34bc38061975fa3540923ec23ea6e511663", 0x1000) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:41:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000040)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:41:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) 13:41:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) flock(r0, 0x6) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) flock(r1, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/ata_piix', 0x103800, 0x43) 13:41:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x7a, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc00000000, 0x1}, 0x0, 0x8000001000000001, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x80800) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) read(r3, &(0x7f0000000240)=""/98, 0xfffffffffffffda5) ioctl$KDSKBLED(r2, 0x4b65, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="02ffffffffffffde1800000073c5f4bce1a859f502a0d217d1eac6d31c948fca7b2fa062abf23b6201d080b510417c00c4eb76d4cc7055d53e70eaf4de95df86d1849525305447aaf907005b898a1fb53309592cad3bd975d98ae20ab7509972deb8051c788242d21e3113a694f9c256dc0d65f8a46b42a29cae3f5f67b4ee11b20d52cc26b9c330497e7c7d058d240cc352ef8d6c6bf977475fd6dbcc6e839c79b2f735638d452a36b4566a91d2e7c0c5a6cbcdb866c6ff07bcb712740d57adb7e2e6c9c746c1f53f35f546035cda2de049c309c315cba4c67481e2dba52c40c226008726d555550bb57bae38bdc7e3b8b4064d36965186daa22659fa2e28559a1ac8ff75ecd0220fc6a6e5e285dae4579a4afd4b8aed85f62c818399b50a92", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) r5 = dup3(r2, r4, 0x80000) ioctl$PIO_FONT(r5, 0x4b61, &(0x7f00000003c0)="ec82e1589506a54ac3eb2d60b55f90b956d95385663d88bf2312099e8ea9c017986d1f034d364367770210d8c8f4e0e1db4aaf39d65135341c5698c68836b79ec20af31584031c6dd1b40b04a23d0bab7749b6e475bfa4ea7ba6852764f19dc7f1925023e641471bd07b6cfc7e7d65359de4dcd9803acb368d0798907066afb8abcc58306539b580233284e8d3e344ea03b45d7af689aedd278d750a6e65945e3aac25541c1eb7a239e48895365565bf4e65b5b0c35a76a29454cb4383f0060ba62d67568620364ba3a78699bdbf8f10dbcdab0c69ad191de5bf25") ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:41:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5460}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:41:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 1482.738301] loop2: detected capacity change from 0 to 4 [ 1482.770337] EXT4-fs (loop2): invalid inodes per group: 0 [ 1482.770337] 13:41:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x1}, 0x500c3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) 13:41:39 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000080)={0x10000, 0x1, 0x9, 0x200, 0x8, "a3ae7d6d5a1779e5b44b71087e9494fe344fde", 0x3, 0x10001}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) poll(&(0x7f00000000c0)=[{r2, 0x8179}, {0xffffffffffffffff, 0x9400}, {r1, 0x9044}, {r3, 0xc018}, {r4, 0x80}, {0xffffffffffffffff, 0x10}, {r1, 0x8000}], 0x7, 0x7ff) syz_open_dev$tty1(0xc, 0x4, 0x1) 13:41:39 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) read(r0, 0x0, 0x0) 13:41:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x40) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000140)) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000040)={0x1, 0x1, 0xf, 0x12, 0x17e, &(0x7f00000003c0)}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:41:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0x0, 0x1000000}) 13:41:39 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xcaacea7577340071, 0x0, 0x0, 0x6}, 0x0, 0x0, r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000040)) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:41:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:41:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 1492.040351] loop2: detected capacity change from 0 to 4 [ 1492.063075] EXT4-fs (loop2): invalid inodes per group: 0 [ 1492.063075] 13:41:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0x0, 0xfdfdffff}) [ 1492.090172] loop2: detected capacity change from 0 to 4 13:41:39 executing program 1: sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0x5c, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x80000001}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x4080000) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=@md5={0x1, "07cce13bf07a2a14965c40b1f39eacf6"}, 0x11, 0x1) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000040)="dcdd634cd3cf57029fb7b7cdb95e33823a6417aa22e2345f0595c59856b776fd9ea80a7130a1829505fce998b49d46f0f62bd34f6e15b215669b48f0a74ea32b9c7052351001c73fc7e862b936ffd9c0564378e6f5c5be808cd525ed9e24d3cc846de95d2315e20c67606f94", 0x6c}, {&(0x7f00000000c0)="3410ff0a71b66b2c0ca8b618ae6cd3d4bb76387362d8cf196750b0522678a89c29db64638d5c314b3c5561d356d8495bb5964147689d8314792dc0a57d58cc5a08d3d95e0f9805dbb3344834c144895c9e6e8f0f87", 0x55}, {&(0x7f0000000140)="4f42f04a3329d9a3c8397a5d2e", 0xd}, {&(0x7f0000000180)="a4edd95d7fdd11c5ebbe6ac69899ecae6a93db6d8125c57f2a18a2b0035a02a034f54d", 0x23}], 0x4) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:41:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) ioctl$TIOCSIG(r1, 0x40045436, 0x24) [ 1492.123696] EXT4-fs (loop2): invalid inodes per group: 0 [ 1492.123696] 13:41:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000080)) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:41:39 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) read(r0, 0x0, 0x0) 13:41:39 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f0000000040)={0x3, 0x1, 0x12, 0x19, 0x1cf, &(0x7f00000003c0)}) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) [ 1498.516658] Bluetooth: hci1: command 0x0405 tx timeout 13:41:50 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) read(r0, 0x0, 0x0) 13:41:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0x0, 0xfffffdfd}) 13:41:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x24, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:41:50 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:41:50 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x80041, 0x0) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0xc, 0x1, 0xe1, &(0x7f00000003c0)}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xffff}}, './file0\x00'}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x34, r4, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r5}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x9a8}], @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x962}]]}, 0x34}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x34, r7, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r8}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x9a8}], @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x962}]]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_AUTHENTICATE(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r4, 0x400, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8841) 13:41:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:41:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffdffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) pwritev2(r3, &(0x7f0000000340)=[{&(0x7f0000000100)="a322d1413600b8119ec551d69c8a7a9f22afe8631f11897af4768b67111891d0d43f47af8f01ae292a421ebde8ea537870c8c71530547bbad1881986abf0a288171b038be052ab6c468f5f79", 0x4c}, {&(0x7f0000000180)="ed8366b2c310cf5b862c618aec887f4cf80bbd1b6ffacffde249be2d8ed0a2f58eb10132a3db0c821c5dca911d658cdb66cf40407a6cdec0f97d57b1e717d88523a7bf7e08766083a39b715b449ebe64dcaf0ad264c44cc9cdeb2463882c1d20a5637b73f75a3e227dfd368d13f60b3409078b40b5a2c207f21d71b6dfb86d651224ec004ec08d407f28c7c9d7addcb199ff36cf96b060c0aa16ee9e57e643651810b8b04a9c2526b00bcd5dab2604afb9b85dfd5b26cfbdddc68e42795481f1f452fbc5e6d8", 0xc6}, {&(0x7f0000000280)="aab4612509395292f40864b3dc131c63f8831217ddd23ed754266d0455c91db424a98da3b30bc430345e9450a5d989ac0d0a191cf3d5affd6ce1699c3c9fbd294365a741cb6deff242de7e521ede51487d008cbac7489fea33f12904088e21ea3e7048e15aca5dcc033439b32231e24bd150ef72b538bfd73fa1ca8ee0c1945ae317e101998fb433a50b914c9f8262e3abdb42fc3440addbe73af2ed25aef0a4295137fe82938f", 0xa7}], 0x3, 0x4, 0x0, 0x1f) ioctl$FICLONE(r2, 0x40049409, r3) fdatasync(r0) 13:41:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0x651cbef1) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) fallocate(r0, 0x1c, 0x8, 0x1) [ 1503.115400] loop2: detected capacity change from 0 to 4 [ 1503.138045] EXT4-fs (loop2): invalid inodes per group: 0 [ 1503.138045] [ 1503.159047] loop2: detected capacity change from 0 to 4 [ 1503.183105] EXT4-fs (loop2): invalid inodes per group: 0 [ 1503.183105] 13:41:50 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b3a, &(0x7f0000000000)) 13:41:50 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000003c0)="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", 0x1000) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:41:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000040)=""/73) 13:41:50 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, r1, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r3, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) 13:41:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x27, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:41:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) ioctl$TIOCEXCL(r0, 0x540c) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:41:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000100)={0x8e09, 0xfff7, 0x400, 0x9, 0x8, 0x800}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='*/!.%{/{@#,.*+]\x00') 13:41:50 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDSETLED(r1, 0x4b32, 0xfff) [ 1503.400371] loop2: detected capacity change from 0 to 4 13:41:50 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x16, 0x0, 0x6a, &(0x7f00000003c0)}) ioctl$TCXONC(r0, 0x540a, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11d86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) [ 1503.414044] EXT4-fs (loop2): invalid inodes per group: 0 [ 1503.414044] 13:42:01 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x4) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCSISO7816(r2, 0xc0285443, &(0x7f0000000100)={0x3ff, 0x5, 0x6, 0xffff, 0x42c0}) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000080)="f7fbbd9f669ec68ff5ae9583dca193be8f789009061cc246eab8e29afdbfe07d7fc3120b52de137a75d7be9d61cef940fbe4e9d2ac7a9a0d1acf4eaaa58b9b69dcd21e1751e83e33eac2a93097b1e03abb228e70c7e872438d060ab5f513bfb43ce0792bc4389d2b9e901289aef0a3e4fc5d79f952d5c8c493dd6bd1fee9") 13:42:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x43, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:42:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000, 0x600000}) 13:42:01 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)=0x5) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'bridge0\x00'}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)) 13:42:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) close_range(r1, r0, 0x2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa2178164f2ca0ada}, 0x0, 0x3, 0x0, 0x6, 0x400, 0x0, 0x0, 0x0, 0x67}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:42:01 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$setsig(r0, 0xa, 0x5) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = accept4$unix(r1, &(0x7f0000000100)=@abs, &(0x7f0000000000)=0x6e, 0x80000) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3, {r0}}, './file0\x00'}) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDGETKEYCODE(r1, 0x4b45, &(0x7f0000000040)={0x6}) 13:42:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xa) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:42:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="b353000000891741dcf91f"], 0x14}}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/102, 0x66) syncfs(r5) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f0000000080)) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r4, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r8}, 0x14) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x78, r3, 0x100, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x804}, 0x40) [ 1514.780171] loop2: detected capacity change from 0 to 4 [ 1514.802055] EXT4-fs (loop2): invalid inodes per group: 0 [ 1514.802055] 13:42:01 executing program 1: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x4, 0x0, @fd, 0x0, 0x0, 0x0, {0x9}, 0x1}, 0x9) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:42:01 executing program 7: ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f0000000040)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) [ 1514.823722] loop2: detected capacity change from 0 to 4 13:42:01 executing program 5: r0 = io_uring_setup(0x46ca, &(0x7f0000000040)={0x0, 0x3f50, 0xde9728410ff71556, 0x2, 0x36}) fstatfs(r0, &(0x7f00000000c0)=""/44) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000540)=ANY=[@ANYBLOB="0100000100004dba4ff854", @ANYRES32=r0, @ANYBLOB="02000000000000002e2f66696c653000"]) r2 = socket$packet(0x11, 0x3, 0x300) r3 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/102, 0x66) sendfile(r2, r5, 0x0, 0x4) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r2, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r6}, 0x14) socket$packet(0x11, 0x3, 0x300) epoll_create(0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000600)={'sit0\x00', &(0x7f0000000580)={'ip6_vti0\x00', 0x0, 0x29, 0x81, 0x28, 0x7, 0xb, @private1={0xfc, 0x1, '\x00', 0x1}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80, 0x10, 0x1, 0x81}}) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r7, 0x4b46, &(0x7f0000000000)) r8 = dup2(r7, r0) ioctl(r0, 0x1d43, &(0x7f0000000640)="e42a58ddd1a955d0b2b90b78b5ee74a57036434fe648b38001b473bb5ba97c4a6671f19ffbba4dcad0d4a13c7f1f2e1d68eec7db805274b3b41a7ec57e78374138440131329dcaef3a39a4e8a6f43559b8e06d64f0be26e713475c19d3657cbd641521c7e63ad8f3c13390d480c20bb85a28c602743d9255e63ad3bcbce551a76162c3b88412d510c63b940a0cc531406913827766e8737ff159e884f9f57ffb3733dc56a00105173926c3fb92539b403f51a44f9becf84287ac281d9f496248191f31d130d8953b75ec927d682aa89e4eb99c304c") ioctl$KDFONTOP_GET(r8, 0x4b72, &(0x7f0000000500)={0x1, 0x0, 0x16, 0x17, 0x198, &(0x7f0000000100)}) [ 1514.836713] EXT4-fs (loop2): invalid inodes per group: 0 [ 1514.836713] 13:42:01 executing program 3: arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x5) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x9, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x800) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x401) 13:42:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) close(r1) ioctl$TCXONC(r0, 0x540a, 0x1) r2 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="be3b3ddbc4f8f7008178a1c6356d45dcc88224bf083f862a3bfea21cd06731dbe4a105d4951ddf1a3cef83", 0x2b, 0x7}, {&(0x7f0000000140)="45212fae54408f3bcd4919a05f92ab0d0593af9ff0788ae2c9dba9067ad4760cdfdb31b1a64800332201b4b2dc870e5a066012c48652351b68c3553cc75d48d91bb2afec90af1fdc5203132c7e9e64f805046ee6ae590ce32a70f71eef283e65f451227bef9c7ed74f0fedfd7c", 0x6d, 0xb75}], 0x1380000, &(0x7f0000000200)={[{@nouid32}], [{@subj_role={'subj_role', 0x3d, '\''}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@subj_user={'subj_user', 0x3d, '['}}, {@pcr}, {@hash}]}) write$binfmt_script(r2, &(0x7f00000003c0)={'#! ', './file0', [{0x20, '$-z'}], 0xa, "029cc5c11900833815f7a9b171765468d27f956b5001436694740b099b3ccfb88adf08029e28a2c9aee03a8c2cba60518710779b721e14beac47d1a1784d632bf2e477578bd722688d91f07f6ccc95b6c44fe6b5b25d32404fa405e7b5677fc8dee7cb34ecf50c8e66e7668503baa8e1f65e77ef120f788f544882aa91b64bddb9a90f99d7787963ba56ad6897820c5743b06e4990f80283a76d2c08904e4e3854b28eb38918b2ae5514671091a0fe02c13e3364f952730977e53b08f59e7189c5b7636a6a12716fddc55f81323f353ce73e6237b6a7a77584d08e3cd1acf2d6a952bf7fbbd37006d4a27c0e01a16e0da0c7a3283b07985a"}, 0x107) 13:42:01 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) 13:42:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:42:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) [ 1515.018125] loop2: detected capacity change from 0 to 4 [ 1515.026378] EXT4-fs (loop2): invalid inodes per group: 0 [ 1515.026378] [ 1515.032305] loop2: detected capacity change from 0 to 4 [ 1515.036710] EXT4-fs (loop2): invalid inodes per group: 0 [ 1515.036710] 13:42:11 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x80402, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x2, 0x6, 0x84, 0x0, 0x0, 0x7, 0x4180, 0x9, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x2, @perf_config_ext={0x3ff, 0x7f}, 0x404, 0x4, 0x100, 0x9, 0xffffffffffffff80, 0xfffffff9, 0x8, 0x0, 0xff, 0x0, 0x4}, 0xffffffffffffffff, 0x7, r1, 0x0) shutdown(r0, 0x1) 13:42:11 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x40, 0x0, 0x1, 0x0, 0x0, 0xf3, 0x60000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x7}, 0x100, 0x5, 0x3, 0x9, 0x7, 0xb36, 0x1, 0x0, 0x100, 0x0, 0x9}, 0x0, 0x8, r1, 0xb) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000140)={0x80, 0x0, 0x1, 0x5, 0x8, [{0x9, 0x0, 0x1800, '\x00', 0x981}, {0x2, 0x202, 0x80, '\x00', 0x100}, {0x6, 0x26, 0x9, '\x00', 0x88}, {0xe3cb, 0x3, 0x200, '\x00', 0x1404}, {0x2, 0xeb7, 0x2, '\x00', 0x1e02}, {0x7fff, 0x7, 0x7ff, '\x00', 0x1}, {0x6, 0x6a0dfba8, 0x6, '\x00', 0x802}, {0x4, 0x7ff, 0x5, '\x00', 0x100}]}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:42:11 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x0, 0x1}, 0xe) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xf1e9, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x0, 0x1}, 0xe) shutdown(r0, 0x1) 13:42:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:42:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0x14, 0xfffffffc}) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f00000009c0)={0x3, 0x1ff}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x15, 0xff, 0x1, 0x3f, 0x5, 0x2, 0x6, 0x5, 0x120, 0x38, 0xfa, 0xffffd813, 0x5, 0x20, 0x1, 0x8001, 0x40, 0x1}, [{0x5, 0x4, 0x5, 0x1000, 0xffffffff, 0x3f, 0x8, 0x10000}], 'G', ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x959) 13:42:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x4) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x2, 0x80, 0x1f, 0x8, 0xfe, 0x3, 0x0, 0x1, 0x42802, 0x6, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x400000, 0x8d}, 0x0, 0x9, 0x2, 0x7, 0x2, 0x5, 0x4}) 13:42:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20064, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:42:11 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000040)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000240)=""/106) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="d4455ed7489002fa5bb7f3510e98045448fc7742bfe53b3f1d8b8397bd9c", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0410002e2f15a3533b3000"]) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f00000000c0)="b5fe80c8541c3a750a63c571276b002b5952e6b86ea0ebaa52499199a099f0a2aa5724a4443d7acf02bff172bb127ebdec33db0237") ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x4008f510, &(0x7f0000000200)=0x7) ioctl$GIO_FONTX(r4, 0x4b6b, &(0x7f0000000140)={0x7d, 0x1d, &(0x7f00000003c0)}) ioctl$BTRFS_IOC_SPACE_INFO(r3, 0xc0109414, &(0x7f00000007c0)={0xcc8, 0x9, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/102, 0x66) ioctl$KDGKBMETA(r5, 0x4b62, &(0x7f0000000180)) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000013ac0)={0x0, 0x4, 0x5}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000013ec0)={0x1f, 0x0, {0x7, @usage=0x20, 0x0, 0x3ff, 0x7fff8, 0x101, 0x9, 0x1, 0x40, @struct={0x2, 0xffff8000}, 0x4, 0x8, [0x7, 0x2, 0xa8, 0x10000, 0x8, 0x1]}, {0x3f, @usage=0xffc0000000000000, 0x0, 0x0, 0x53e, 0x4, 0x4, 0x72, 0x4, @struct={0xfffffffa, 0x9}, 0x4, 0x9, [0x3, 0xcdb0, 0x67, 0x9, 0x2, 0x4]}, {0x1, @struct={0xff, 0xffffffff}, r6, 0x1, 0x401, 0x1, 0x100000001, 0x2, 0x90, @struct={0x4e1, 0x3}, 0x1000, 0x21a0b39e, [0xfffffffffffffff8, 0x7, 0x8, 0x1, 0x0, 0x2]}, {0x8, 0xf06}}) 13:42:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000, 0x100001}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) [ 1524.665160] loop2: detected capacity change from 0 to 4 [ 1524.690083] EXT4-fs (loop2): invalid inodes per group: 0 [ 1524.690083] 13:42:11 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000004580)=""/124) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000004600)={0x0, 0x80, 0x2, 0x7f, 0x3, 0xff, 0x0, 0x9, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x6b6, 0xd0c7}, 0x1000, 0x6, 0xffff, 0x3, 0x7ff, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x800}, 0x0, 0xb, r2, 0xa) clock_gettime(0x0, &(0x7f0000004100)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000040), 0x6e, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/118, 0x76}, {&(0x7f0000000140)=""/18, 0x12}, {&(0x7f0000000180)=""/38, 0x26}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000001c0)}, {&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000000240)=""/88, 0x58}, {&(0x7f00000013c0)=""/210, 0xd2}], 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="18001000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x70}}, {{&(0x7f0000001540), 0x6e, &(0x7f00000016c0)=[{&(0x7f00000015c0)=""/239, 0xef}], 0x1}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000002c40)=[{&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/174, 0xae}, {&(0x7f0000002840)=""/245, 0xf5}, {&(0x7f0000002940)=""/253, 0xfd}, {&(0x7f0000002a40)=""/74, 0x4a}, {&(0x7f0000002ac0)=""/183, 0xb7}, {&(0x7f0000002b80)=""/176, 0xb0}], 0x7, &(0x7f0000002cc0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x138}}, {{0x0, 0x0, &(0x7f0000003fc0)=[{&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000003e00)=""/240, 0xf0}, {&(0x7f0000003f00)=""/148, 0x94}], 0x3}}], 0x4, 0x1, &(0x7f0000004140)={r3, r4+60000000}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, &(0x7f0000004540)={0x0, @adiantum, 0x0, @desc4}) [ 1524.707965] loop2: detected capacity change from 0 to 4 [ 1524.717311] EXT4-fs (loop2): invalid inodes per group: 0 [ 1524.717311] 13:42:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 1524.784415] loop2: detected capacity change from 0 to 4 [ 1524.790802] EXT4-fs (loop2): invalid inodes per group: 0 [ 1524.790802] 13:42:11 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x77, 0x0, 0x0, 0x1a, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSCTTY(r1, 0x540e, 0x5) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) [ 1524.807776] loop2: detected capacity change from 0 to 4 [ 1524.819626] EXT4-fs (loop2): invalid inodes per group: 0 [ 1524.819626] 13:42:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000040)={0x0, 0x3, @start={0x0, 0x0, "6fb326a18be5afb93c90eec156bf3d20f6a1f02e99e7b3348d4166a82aa65e2c4490409a59cded60b32a5cbe33b1198ca31ce6f4dd2210e58cd45afd381f48f2e0e0d4d010d2fd2d3b9da83576981cec22aeabdddab2903733f185f73b9b13bb806cf049e946a2b4feabf18ec0b98020a8b10e69dc36cc609fa3846b72173306190da7202611fd9fe95488d14471045261f30c5a544e77a9b72fd245c512331c14475dee7a113d2c8d761f8101df3cdc29eecd9855aeeee91160af9483badf24ec136799b6b3006c055df13e52b52c103db60d64404f9bced10125fc3dae32315a22064f270010cb91e06a797dbbb851c645cc5ce5e5791f9850ae4fe7ab19c5a0bd9c31af891a2e40fae1230d1d1ba22d7af9081549fac80f3e078c5a15d74477b05e2338fc9cda5ef3097733df8829e35115e5074939be1d689cdf4d976a460942e170aa22048a7b0ef86f6146245184e83c152f8c5c2e9e3a3080134b13eaaf9f17a4dca393bdff9fa53fb76acb8f53bb9818bd8da2f12802e8eeea192d7252891e0ee0d25617fed11dd104fb8fb49424b4758d5e502da11f4729b841088498c7630c5eaa1dbc9f1af3050d6c6531437b5f3b282d7f82ec02efc7014bc78f760f92a95bb68b1b5693c432488a62d545ece0f494cda3496c4fa90a822f614f546d8826754c0874518f21f9a845612d9cda85f33ef01c9c93b7ce843abe0de84cc7796ba4261ca98174b29594241a18d05a939e0d8a3447c57ae72553ab9bce4c6bad667dc25bbf45ad817ccdfb684677c4be342f9bad78376960b1e0fd3c38b7be4861d8e1d014e1a35b67e26c9ce1fb60f28b98b3d1259483dd53de71ca9305ab89c7fadf4598be8cfb8740506b0a8b9fcdb18b90d720fe6647d0e616970f1f9356f1e6aaee561c84c01ba004a6d18f387dfc31f0b8e2ec58ce55f04ded709468f4c5478a8b8bca4954bdc2d42d2b3344a43dbfeee251ad24112ea02128e59d34c44982cae27d2ede91af80816b704185796edf27162bbedafe36497b907be2ec0d0705926d8d9df521ed7b8781c34361c8dc74edf6c0a423d5e70bdc617575fac9ff047b1ca912b238d063769a36d61960cf1a930f2e093109354f7349072c37f34a510df63aa5b6b839db80bcd98559d0eeb518912cc16ba9be2bff2dc3697d14e63440663f59a2e2dd6d984f037e841b2d47520169658ff34212fc323c9f9891a214b3e2112075a6eb70f914f70effb39e10f5a755d7c518569d1795e3bbe9c306ae286a361408dd7bb06f3f7a6135795d3a1f690bbeb9630eb30b4aaf1370a9271f367b33f1e4c7309b159e7258d17d2451a3b929c5fbca6808d6beddcb4be881e052abe2f15364c9986cb07ba0364c82d725bc0a8016cd7cc9aef4bef960945a41353e14fddbac0231d93024a097629b6555bf0eace41fd92e840c1a8b", "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"}, [0x1ff, 0x8001, 0x3, 0x8, 0x0, 0xfff, 0x3, 0x3f, 0x40a1, 0x0, 0x4df, 0x0, 0x80000000, 0x7, 0x5, 0x100, 0x0, 0xffffffff, 0xffffffff, 0x3, 0x8, 0x9, 0x2, 0x7ff, 0x1, 0x80000000, 0x9, 0x1, 0x1, 0x83, 0x7ffffffd, 0xfffffffffffff801, 0xfffffffffffffe00, 0x3, 0xce48, 0x6, 0x5, 0x7, 0x2, 0x1ff, 0x1, 0x7, 0x3ff, 0x4, 0xff, 0x1ea, 0x1, 0x0, 0x1, 0x8, 0x6, 0x3, 0x20, 0x6fce, 0x0, 0x0, 0x8, 0xa0000000000000, 0x8, 0x1ff, 0x1f99ea30, 0x4000c0, 0x80, 0x100000000]}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000a80)={r1, 0x2, 0x1400000000000000}) 13:42:11 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) io_setup(0x4, &(0x7f0000000080)=0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) io_submit(r2, 0x2, &(0x7f0000000240)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x1ff, r3, &(0x7f00000000c0)="0da673b3243086e7b6d1505e9981ae5183328121535bf994e4d469d24fbc77d07e6b93d1a1c49befeca45d5724c04832ee756dd82898c00c43e42a0a4028903c6e295e7ea76080d606fc623e16af3c02f64a176fd33622c7b7451c4238fb366b", 0x60, 0x1f, 0x0, 0x3}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000180)="20b719a12285060df32e74c71f1cd5ffed4c7c602ca66f85f2bbd06d740ebc286e068d2fbbdeaea5032f5cb6fbc7fbc64be6c78619fcd126e0333203224e9cfe1bdd07a03d31961cd16b3cf403863cca726a1e4b2f1e463b4e07e61920f56240b5f1a3d860f127af0ea1", 0x6a, 0x1, 0x0, 0x1}]) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r1, 0x1) 13:42:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x20, 0x12, 0x200, &(0x7f00000003c0)}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0xb) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:42:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 1524.918756] loop2: detected capacity change from 0 to 4 [ 1524.924643] EXT4-fs (loop2): invalid inodes per group: 0 [ 1524.924643] 13:42:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000004580)=""/124) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000004600)={0x0, 0x80, 0x2, 0x7f, 0x3, 0xff, 0x0, 0x9, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x6b6, 0xd0c7}, 0x1000, 0x6, 0xffff, 0x3, 0x7ff, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x800}, 0x0, 0xb, r2, 0xa) clock_gettime(0x0, &(0x7f0000004100)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000040), 0x6e, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/118, 0x76}, {&(0x7f0000000140)=""/18, 0x12}, {&(0x7f0000000180)=""/38, 0x26}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000001c0)}, {&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000000240)=""/88, 0x58}, {&(0x7f00000013c0)=""/210, 0xd2}], 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="18001000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x70}}, {{&(0x7f0000001540), 0x6e, &(0x7f00000016c0)=[{&(0x7f00000015c0)=""/239, 0xef}], 0x1}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000002c40)=[{&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/174, 0xae}, {&(0x7f0000002840)=""/245, 0xf5}, {&(0x7f0000002940)=""/253, 0xfd}, {&(0x7f0000002a40)=""/74, 0x4a}, {&(0x7f0000002ac0)=""/183, 0xb7}, {&(0x7f0000002b80)=""/176, 0xb0}], 0x7, &(0x7f0000002cc0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x138}}, {{0x0, 0x0, &(0x7f0000003fc0)=[{&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000003e00)=""/240, 0xf0}, {&(0x7f0000003f00)=""/148, 0x94}], 0x3}}], 0x4, 0x1, &(0x7f0000004140)={r3, r4+60000000}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, &(0x7f0000004540)={0x0, @adiantum, 0x0, @desc4}) 13:42:21 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x540b, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000040)) 13:42:21 executing program 5: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) 13:42:21 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) r4 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r6}, 0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x5fc, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4e0, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x168, 0x3, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '\x01\xbe\xddk\x19$n\xe3AfL\x90\x9b\xd9\b\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '*^)-*\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x385}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3c}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'wlan1\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'wlan1\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x500}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xa6af}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\\+$,%{)]\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffc}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '#!@(\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '-,\',@+++/]^\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '*^)-*\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x14c, 0x3, 0x0, 0x1, [{0x13c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffaeba}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '}-9-$+]\\$%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x108, 0x2, '\xb8\xe0+z\xd6`?\xcb\x02Rvn$\xb6\xf3s`W\\\x9e\xdc\x9e\x00\x93IN\x012\xff\xbf\xc4@-\xec\x832\xae\x90\t\x83\xb0\xa8\'`:\xef\r\xa1a\xf1&\xba\x01D2\xfb\xf2&\x8d\\?D\xa1A\v\xb0\xc4\xfd\f\x96\xecC7\n\x8b\xdd\xc3\xf8\xf7\x02:V\xdf\x8d\x1d;\xcab\xa3\x9a\xfe\xcd\xd5P\xda\xdc\x97u\x17\xd8-\xc8\t\xf2\x17F\xc0\xddd\x06\xd9Q\xf2[\x12ho\'eOr\x04ia\x82\xdf\b\xf3\xa3\xd0`Z\x10\xb1f\xfd\xb4\xda\xf5&\xf3\xae\xa3J\xbbm0\x01P\x89\xf4\xcb\x9a\xa2>j\x89r\xb4\x88B\v4~\x10?\xac\xfbK\x98\xd2\x0f\x17\xcc(K\xe8\"\x9c\xe8\xd3\x1f\xde\xd1\x8fE\xe0\xf7c\xc0\x1fj\xf1J\x88%g(\xd8\x13\x8d\xb8\x92\b\xc5$i\x05\xf4l\xa9c$\x9d\xb2\xf5\xe8u\x1f/\xcf\xb8}l\x94s%bXUl/\x1cnj\xf3^\xd4\xb2\f\x14z\xf2\xc3\x00\x90u6\xc5\x9e\x8d6\xff\x14\x98\xb0e\x7f\xe1:'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0xfe, 0x4, "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"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x10c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%\'\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '.\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'wlan1\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'netdevsim0\x00'}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x48, 0x2, '{\x80#w\x9c[2\x12z\x01ocJT\xd3\xad \x03or\x9f\xc6\xb5\x15\xf3\xd6L7\x9f\x8d\xdf\\\xdf!\fpG\x89\x0eF\f\x8e\xe8\xf1K\xdcB(S\xed\x9dS3\xec\xe5\xf6^-\xdb\xbc\x97,}\xa8\x91V}1'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0xac, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xa5, 0x5, "6219af241ec7b87d696d88dcecfd01aa6fd3c2594011c4e931c608351ea4647e1aae4ae2023163b20b15d4a2909333bf1a2b7997a1b0bf8f38a6fe1b600f45074852c93fd305918ab4294af9e9f2a50cfa333466a8367e3cdab774845d4edd33fd99f5a1a71d30d7377a368ded8007cf33295007a8a09c9f6079321cba3581fb6d429e849fbbf9f41d0830eddec6d5d061d1ace0314ce3edc1ac9ec086572c7e6a"}]}, @ETHTOOL_A_FEATURES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x5fc}, 0x1, 0x0, 0x0, 0x4080}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x44}}, 0x811) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETSW2(r7, 0x402c542c, &(0x7f0000000040)={0x7b, 0xf0000000, 0x6, 0x7, 0x4, "38fc2725211b892e0fa0bf92c91ba982779bfc", 0x80000001, 0x7e5c0000}) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r8, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCGDEV(r8, 0x80045432, &(0x7f0000000080)) ioctl$KDGETKEYCODE(r7, 0x4b3a, &(0x7f0000000000)) 13:42:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:42:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000180)={0xe3, 0x7ff, 0x80000000, 0x7, 0x13, "9c58f880da1de49a4dccf301c75cfd05cad9d9", 0x4, 0x2}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$KDDELIO(r2, 0x4b35, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8, 0x3) 13:42:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) r1 = getpid() pidfd_open(r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x4, 0x8, 0x7, 0x7e, 0x0, 0x7, 0x2, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f0000000080)}, 0x45, 0x2, 0x8, 0x1, 0x2, 0x80000001, 0x800, 0x0, 0xfffffffa, 0x0, 0x6}, r1, 0xb, 0xffffffffffffffff, 0x2) 13:42:21 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x3, 0x39, 0x7, 0x0, 0xffffffff, 0x24283, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x184, 0x4000000000000000, 0x20, 0x0, 0x3, 0x6, 0x3, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x80, 0xff, 0xab, 0x0, 0x0, 0x6, 0x20280, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6ba, 0x1, @perf_config_ext={0x200, 0x1ff}, 0x2082, 0x5, 0xffffffff, 0x3, 0x10001, 0x3, 0xffff, 0x0, 0xfffffff8, 0x0, 0x5}, 0xffffffffffffffff, 0xf, r1, 0x3) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) sendfile(r0, r2, &(0x7f0000000180)=0x8, 0x4) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) [ 1535.013350] loop2: detected capacity change from 0 to 4 [ 1535.031283] EXT4-fs (loop2): invalid inodes per group: 0 [ 1535.031283] [ 1535.053314] loop2: detected capacity change from 0 to 4 [ 1535.068114] EXT4-fs (loop2): invalid inodes per group: 0 [ 1535.068114] 13:42:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000004580)=""/124) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000004600)={0x0, 0x80, 0x2, 0x7f, 0x3, 0xff, 0x0, 0x9, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x6b6, 0xd0c7}, 0x1000, 0x6, 0xffff, 0x3, 0x7ff, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x800}, 0x0, 0xb, r2, 0xa) clock_gettime(0x0, &(0x7f0000004100)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000040), 0x6e, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/118, 0x76}, {&(0x7f0000000140)=""/18, 0x12}, {&(0x7f0000000180)=""/38, 0x26}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000001c0)}, {&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000000240)=""/88, 0x58}, {&(0x7f00000013c0)=""/210, 0xd2}], 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="18001000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x70}}, {{&(0x7f0000001540), 0x6e, &(0x7f00000016c0)=[{&(0x7f00000015c0)=""/239, 0xef}], 0x1}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000002c40)=[{&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/174, 0xae}, {&(0x7f0000002840)=""/245, 0xf5}, {&(0x7f0000002940)=""/253, 0xfd}, {&(0x7f0000002a40)=""/74, 0x4a}, {&(0x7f0000002ac0)=""/183, 0xb7}, {&(0x7f0000002b80)=""/176, 0xb0}], 0x7, &(0x7f0000002cc0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x138}}, {{0x0, 0x0, &(0x7f0000003fc0)=[{&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000003e00)=""/240, 0xf0}, {&(0x7f0000003f00)=""/148, 0x94}], 0x3}}], 0x4, 0x1, &(0x7f0000004140)={r3, r4+60000000}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, &(0x7f0000004540)={0x0, @adiantum, 0x0, @desc4}) 13:42:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0x800, 0x80}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000080)) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x100, 0x30) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) syncfs(r0) 13:42:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x410, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:42:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) write(r1, &(0x7f00000007c0)="07a4092249747465951db81d210ff65cb1ec1eb8dd5e8a727b04379348d168504bbfdc7a2348c1842879a49d2a125a182c09814b66196186938cdcb28bcfaed21600b572f7023aaf3dea2e9b25a0faf89c709b29ca981f34885d3879d33c946b67d22ce662df9b548a20d9f44b9928bf6deb626ebcf7119287ed05762fa6f344f0db8dddcffc90f654c83bce7f2da8bfcae45b5ea702284141c42e8d3cc7e84be2b908ef1eaa18b67c0e76e2f82e95de9f341ddf0799068995650f085d8dff33d8d7b29c13827cc7733e0dc69a4d9e3c2985c0e7b0c701cfdf4ec5f5ee01c8cb3807663aec28f6297a156441ce8f1145423711d797949e9aa564c2c5af6edd1af55e16064a6c944bd383ee9575051c2ee9d48509f0ec3061a09b1e6219f32d4e65bbd4a3e85de73243c3e81c7edff3065d2e26e901dee75184ca6fef3d8cc06257e1bf96b7ed5920108b7e294aad95b47dfabe7b777a52395265556e471272b2b28294305d14232e9e74db16f9ffc5071df650a79dc7ff99f10365330f22c27b70c8e97f3f4a24c62b90a7d8a0f42aab565668452a12cb1f6557516dafbe5235420a32e42d73a927130cf04c13a891cfa9b5a801ad0213f126b9338d584a767ddd7a75cd1f0c1963ac1e60748bc3520cd09d4ce7844b8529e48b610a6b74e1b002108606c1da2428a3010e244ac58ec1879f294e3dcd9f2156de93181c5398013484dfd335347d82dd4481ce596138089749dddb055aca9be9c1f63b04244f61a562e99195e26b6f61fa28abbe00f1e81b5305cf7d179550cd9ed2a618c8183cab3ced244b3dce72c6e0bbce8fb4bd02abe01ca2ae49ea64da1f55c441d1979d59861d07efecdfe7560a82767d3e6e249fd13b718fe8879e33d50724e8625011c6f97074f05e4b281395a09046693aee85f2145099a1d0b852074232a74ec740ac0bc95f4864c1080a93f3760ea9b7eea5dd33fc7c4ca731854c86c388a713f8a2d69c0be048579e1100ae7f278109e4683fe931c5319ea050b294901a7f0843e75d7a1be31541daf22059e1371434ab955d6f2d09e91b65edd28e4aec3311707a8f8f48f955841c30ccc18c46b23237365264e76d3cbe13e7ed4dde5b589510e04ae5f15e81213ed9f7889089a36079e765499a5997b14bbe26f017ad86cc29f0828ef2f773400f6631dfa035290d5a73bc1485b8e9d773d789a56a3c6cceb260c2e7660f4294bde7c8b5caca5eff8071de8f0df3204d7f83756d9c6aab8dd3df737523cf761bcb621bf28504dc69ad40ece27252d7afcff38284de1c06cc92d04588cc3df3c1e143d1318ddf3d03443b6a8641da9a9d136e60023b88815c69703a0e91119f7b45a5616280c34eaf30eff27d39d2e0e249a27734bda1e9fd7aad52bf287ce9f7ca30f78a3585442b5e9a50a3a42dae35a632438e099f894976b5c7419ca0b2112f72dd1fa1f37d02ba2623903c4b0d46abd6635a19d6bd300fb1ab1f83f3869f6b314861d9a2ae6566ad2c316a3ce3ab05ca3b01f4056a53628a6d6c0a747dc0554ccc4b3bdc3b4853c919d1cbbf979596edfa4afcf4cd2b42df539049ba366cb5b85857ffcc757566fc3e9eedc1d9de7e7fde04baef1ac0a5e35b7025f05f8faf7aab212b9d5b94a927e543f23a64c7e96934c20a4e1d1814ea2d102db0204a75b0ae511492d9097873ece8371528589c019996735f76da5ccb5871762db982f31df1d67f7af6a5fb3aacab9e7a983eae1bad864be2135f752a60666d971e09f6df43077a27dcd8826cc2a358c94ca149d2732a32844c85d76a63b0eb09efb73f3a25b99cb25678ee54e8c3bde947e3967bf8a1a8490776a590c22e7185a2ac58ac85e3819ae0a1994f9adce4b59227f01ec6d97b58aaf14cc3284815807dbd9d26231c39083915e9c0f99a76f490e3ad27db17376eedacc2e25861ca2144b4c563af8690af27056194433afe85784954a20537b357618555b0e230fc6ee218b775076e8e5d5093a80b2df5cabca1aa4ed56ac3ceb26985842bb5d73b667b742d1a49d5f7345c778bd0feb2c917889421ff56188d80618c6a3b5b53f77aa9e53f64b66360d25ff74c3b5b6665967b3905688b8e412a07c9856fafcf7b149563a0ca0d328a274bc19f620cd2b94547edfc7964222381f36ea8c7f58ee14c8b2ee51a0400096f8791c041f0a58a86a70226a03c61421e0ec0e928637ad45d648c89f8dd7965f6f83865970efc015268ec4ecfe042846a975a4fec0ec358ceac5c57e8a8fb5ec084098c9d67cd76c4b523efe1b42cbcc251b0cbb002953a2805bf558b467d0ab571a8d2e57395acd768f08a29bdc85d4edf37b60db4c72e8525e47b9d03deda61bdc73382e24d6cdf1ae8e2f277fc74f8b1b31d15773769487df6f61a21a59f0afabc4e9dfc8196d2fb1162276545c9c45f9f56df61486dff833d4c7a5655e403f6c888a9d94814d15828651e6970537b9304daa7ac8056c4262ab4b189b72b9dbeb0f16ab3a20adfdc7ecdd48c1781a73f60accd733a83d98fbd9eaaca78b5fc8a6ce194af2ca309a4272f7eb1775f804ae45c19b366d244089b201876bbdb38c40afb95d401f46c9b13a7367e285c79566e62c5fe7c941f5c5fcb92d75b6a604319c7118f678da570f62fca12da7fab455b73f04d52d6657bf55e159b50df133b4005b373c07e820c9c3a4e2deec6112c16399514e51b4f83c09c0f0c3f633def798651ea997cc0ac150241767f378453098b5ccaf7cdea9db80e060fb004ad0e9a7316b0ee2cfa2b2a1ed13158148db6bd9fa6ffc7a2db87c07411aef5f5f1cac1349a195fcee548d8e051b209ad46894b786bd9d5b6f6e9109d6d8df7cea30e3b0f079c763df86e74001e745869942243dba642ee088553099917aa844cdd1fcb31ab803c510b6eb1bcf4c358f91689f4a73ce8a7a74defe48ce5e2114abf779620b88018fc4e7d0e03aca6b8e6e202497aab654f1689d03bddb5690950a83af5d06e98b7c1db0c58d82fb4fadc5ecfebe1bc9f70b319d3561133cb1c4a073c069c6395d7d97e68a2959a76dd6feed32469682e471de30e959418c792e5bf4991ae47911538843bd2907d5291aafa983e6594154368291d04fdab3dd53fbb8de0a7f22941bb830e8d99c233cb73555ed94a76aceb1731b980b6644e3c0d863588a3133cab9e0bcb11e932d90b44d52880cfe86147e4f4cac375e3308c6b6a0ebccd5ab846b5d1dfcc03156901f07f562c51873f06bfbbee658e21c41462645170e0d828d9c10397b631fe5d7448ab7d76aa92f3ed3bd549ba2b134aa85befde119d8084fc78ff755402f656358cdec3523ecc38d7dc227832bf8d63d255a592f3b42d4d702ff2089e106acdeab08f08e7c343a81c915199ab03a2a869f766cab08091e9427a584103d4c2ab2b9c94ec991f50ca671be11989ba0c56511633f9ceba3e6a22b4b9f6b6cc1241230b3b2eab57acc4263494e3076467d8bdf1ed145f50f4fca2e9d81f4cce1085bd80841601d0f44500a737796ca2351312deae96648dbe372b6d23cdf4cee353154e399c6e1eb7f857fb22cb6821f6713c49334eaed2ba82de089009cc05eb626810bf749a19985186315389edd212c56dafff1aca4301756b00eae60c36c079d9a21822f017e09fcbb448c40bc7e0f45265126db110c3f1c2d384ae290cdd1cf8eee43a577d77563bf3621013c290ee25d89b19d259da4376cf4b97785034e6cd6677e86e9af61b55f683fca2b5bbee19c8d05a39924480fa27ff0255a0c7fba180805b71ed6838908f693dcde8b7d4f6ea132b0c51a068c7b699ef1d3561c53c33187d73791f8d81ac85f5d46c351b91cb4631fe1af064860241edbb361962b41bc1d9f61cef65b0bbbd2e31809a2cd0c4bd8ab36565cb1e7e10d90e0619128201b2d3ffcdbb06540e7cb9610c967639d598cb4ab6afcd31db37f45be573871c37e272b343e7fdea072594077742c1a1239e9f1b8d42d90d093fe022b005dd38c30ed96440efec8c9dba6b9c7185fc875fd7a1c504538c3ed6805aae3da1ec38278d933d9a720bd5b69e48230c3d698862fda108b236bd0c0cd22e13282b91dfa42fc76b5999e10232beb0259915484831b8e8c947c2cfdd588d392ea0122f37c5454604cb8632bcd071ba2e68ea6f56905f92f9f27265b09005be40c43fec61d4ad6569d88a7745ea2ecbafab99331ae2c60c31a1c790bd73b424063e391fcc20d42df542c30df6d79bedf05edf82591be57159870631df08fcc003f42bc6c864b056aa042fcde7009899931b5d6a28b5fa818d3d37ddbb0e043285744eba8174034423f77ad602c6bf3e59c3bd30790a4c42c2a73f8ae7c327716318fd0041263aa06f10d243814482ac8257c318bce759726623771a59b06aae3a80c59b4ac1fb46bf7cfdab8761a2e87ba4afdd356c753c66f71c501366c06b4e0f6fa57a48d797baa104bcee5f95c00125ed9940debff90a6cce04e2ec18cbe7e513eeea6054a9ffa9e78d84251c98000e9565954a33f757c8bd4805407e9ac60c85e25d3bcbb7107048ad5812a01881d0b264c5fcee80bf441b01479081a71ce391669a92cb34a628bc1c86407057dac12c52e89c7b0dbf39c3be34f6daf18db7598003da77575ec2c096c14946caa9bac822b0dc90bda74b6cf78380f0b5cff5e0999e41336dfbadcbb88a4103d89fba90df86c8a5025e145b01d844b37b757225724c3ae3425eb20df045a4f159f2fe44cec4ffb1ee05d5dcf1c2911d91b39b6a46196eba593f2229cc29d66accbbd0f6fe71e38d46fc6f4a2e87be55fecdee2bcc1517df297f4ef4075838fbc7e390d011c919e7f324fd7b11c62e3fb8700603265c4fb7243afa595ba19c57b43c6de29b4dc20119ad52352563047fcad6a1facd8c22de7091cad393ffa489a2a704760e455bdcd469462d54ba2b41b341ac619209f4c459d958251d330541a741322cd998527a957c69f89a7413799ef7ecf164182ee37fd9466b7f8ea6b009597727b011626d7049d0277127c708868fe9a629f65e42f99532c2b2e1b14c9f606928fa7c644e640ec23d882c3f650917d8da5c005af59a45222152d97331a4d954f57f8e32ac3cca64e4edf84265f44d1dc40d3375555cf234a2c3f25a2bb1ac100693fc13ef48977700e4da2d09ef40098b78727527b13d77454cf446fdafc18b1fa4d66159a2d1bfd8dcca80aa5ee0e091123704b95703f740fc5649dac210341fc00db6c11e47b115b30b0c4b913502082d5c4908c196aafebd8706edfb6f867f303a025e4467ae1ae7f9bf0fd7b116a9f1561cf297756d021cb350eb42d92f45a270c8eecfc6a85d080a4bd1288c5420173aecfb793e63f77dc091ac79ad8c5286ae4b263b48968e71c00d407715df5a85ebdd197de0917e7f84c7e08956424d6c26e4de023db1330a4363596983f1cfc28d4799f58dcbdec4c89c963fcb442bc3f97c68b5d408e05648b364be5b33d4f85a06890afe8afba6373f0c0fae153f74e9c333fda75f2c2644e20ffba68daaa4d42f81ebf5622f8a25de06a8aad1e91140187886c699781d90a8c17222e6fe6bdfb9a4b854deaf1d81bbd99c5c24af5511e9f3bf2cdfe8028e73da8e5e7b7b382fc70f0040707e3e8975d806622b007a10ea8f0530e0d8857bdd04baea9a539548192cde925cb67320f487f2688128730b3e0f1794f07fc94af3085b49dd55a2f128ec28c92004fea462000e956ff06ed93c06a8cc74895b823f5c821ba75adfa88cbbb8051c", 0x1000) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x4, 0x8}) read(0xffffffffffffffff, &(0x7f0000000040)=""/102, 0x66) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x1, 0x1, 0xd, 0xf, 0x1dc, &(0x7f00000003c0)}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$TIOCSIG(r0, 0x40045436, 0x21) openat(r1, &(0x7f0000000100)='./file0\x00', 0x2b55b4aad1774e96, 0xa) 13:42:22 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x3, 0x39, 0x7, 0x0, 0xffffffff, 0x24283, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x184, 0x4000000000000000, 0x20, 0x0, 0x3, 0x6, 0x3, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x80, 0xff, 0xab, 0x0, 0x0, 0x6, 0x20280, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6ba, 0x1, @perf_config_ext={0x200, 0x1ff}, 0x2082, 0x5, 0xffffffff, 0x3, 0x10001, 0x3, 0xffff, 0x0, 0xfffffff8, 0x0, 0x5}, 0xffffffffffffffff, 0xf, r1, 0x3) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) sendfile(r0, r2, &(0x7f0000000180)=0x8, 0x4) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:42:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000004580)=""/124) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000004600)={0x0, 0x80, 0x2, 0x7f, 0x3, 0xff, 0x0, 0x9, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x6b6, 0xd0c7}, 0x1000, 0x6, 0xffff, 0x3, 0x7ff, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x800}, 0x0, 0xb, r2, 0xa) clock_gettime(0x0, &(0x7f0000004100)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000040), 0x6e, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/118, 0x76}, {&(0x7f0000000140)=""/18, 0x12}, {&(0x7f0000000180)=""/38, 0x26}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000001c0)}, {&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000000240)=""/88, 0x58}, {&(0x7f00000013c0)=""/210, 0xd2}], 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="18001000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x70}}, {{&(0x7f0000001540), 0x6e, &(0x7f00000016c0)=[{&(0x7f00000015c0)=""/239, 0xef}], 0x1}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000002c40)=[{&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/174, 0xae}, {&(0x7f0000002840)=""/245, 0xf5}, {&(0x7f0000002940)=""/253, 0xfd}, {&(0x7f0000002a40)=""/74, 0x4a}, {&(0x7f0000002ac0)=""/183, 0xb7}, {&(0x7f0000002b80)=""/176, 0xb0}], 0x7, &(0x7f0000002cc0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x138}}, {{0x0, 0x0, &(0x7f0000003fc0)=[{&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000003e00)=""/240, 0xf0}, {&(0x7f0000003f00)=""/148, 0x94}], 0x3}}], 0x4, 0x1, &(0x7f0000004140)={r3, r4+60000000}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 13:42:22 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) [ 1535.273657] loop2: detected capacity change from 0 to 4 13:42:22 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x3, 0x39, 0x7, 0x0, 0xffffffff, 0x24283, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x184, 0x4000000000000000, 0x20, 0x0, 0x3, 0x6, 0x3, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x80, 0xff, 0xab, 0x0, 0x0, 0x6, 0x20280, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6ba, 0x1, @perf_config_ext={0x200, 0x1ff}, 0x2082, 0x5, 0xffffffff, 0x3, 0x10001, 0x3, 0xffff, 0x0, 0xfffffff8, 0x0, 0x5}, 0xffffffffffffffff, 0xf, r1, 0x3) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) sendfile(r0, r2, &(0x7f0000000180)=0x8, 0x4) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) [ 1535.287269] EXT4-fs (loop2): invalid inodes per group: 0 [ 1535.287269] 13:42:22 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x20, 0x1, 0x0, 0x0, 0xff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x8) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000080)) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000140)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000200)=0x5) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCSCTTY(r4, 0x540e, 0x0) r5 = syz_open_dev$vcsa(&(0x7f00000000c0), 0xffffffffffffff80, 0x4c8240) close_range(r5, r0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KDGKBLED(r6, 0x4b64, &(0x7f00000001c0)) ioctl$KDGETKEYCODE(r5, 0x4b4c, &(0x7f0000000100)={0x9e, 0xc7}) 13:42:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) syz_open_dev$tty1(0xc, 0x4, 0x4) 13:42:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/drivers\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0xff, 0x1f, 0x1f, 0x0, 0x9, 0x400, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xd5a, 0x4, @perf_bp={&(0x7f0000000080), 0x1}, 0x4000, 0xfffffffffffffffc, 0x0, 0x4, 0x0, 0x7f, 0x7, 0x0, 0x1, 0x0, 0xe8b1d9e}, 0x0, 0x0, r1, 0xa) shutdown(r0, 0x1) 13:42:33 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r1 = syz_open_dev$vcsu(&(0x7f0000000040), 0x7, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000080)) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000003c0)={0x0, 0x9, 0x0, [0x0, 0x200, 0x6, 0x0, 0x7], [0x8, 0x7fffffff, 0x6, 0x0, 0x4, 0x8, 0x7, 0x1, 0x81, 0x4, 0x7, 0xfff, 0x7, 0x1, 0x1, 0xfffffffffffffffe, 0x1, 0x200000000000, 0x9, 0x4, 0x5, 0x1, 0xad6, 0xb7d, 0xffffffffffffffff, 0x0, 0x1f, 0x5, 0x0, 0x3, 0x2, 0x9, 0x8, 0x7, 0x2, 0x7fffffff, 0xf9, 0xffffffffdd64aa84, 0x9d72, 0x7, 0xffffffffffffffc1, 0x3, 0x11, 0x3, 0x1, 0xffffffff, 0x5e4, 0x2, 0xeb280, 0xfffffffffffffffd, 0x9bbb, 0x7, 0x7fffffff, 0x0, 0x100, 0x3f, 0x6, 0x43f0787d, 0x2, 0x256b654b, 0x10000, 0x99cb, 0x8, 0x8, 0xc5, 0xffff, 0x9, 0x8001, 0x9, 0x4, 0x4, 0x2218cf2e, 0x40, 0x7, 0x7, 0x7fffffff000000, 0x2, 0x78, 0x0, 0x0, 0x3f, 0x1, 0x800, 0x1f, 0x11, 0x101, 0x1, 0x7, 0x1, 0x40, 0x1f, 0x1, 0x6, 0x3, 0x7ff, 0x0, 0x1, 0x5, 0x80, 0x0, 0x7f, 0x0, 0x8000, 0x9, 0x9, 0x4, 0x2, 0x5, 0xa2e9, 0x2, 0x8001, 0x7, 0x5, 0xffffffffffff461b, 0x100000001, 0x8, 0x1, 0x1, 0x6, 0xcf, 0x1]}) 13:42:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x437, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:42:33 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x3, 0x39, 0x7, 0x0, 0xffffffff, 0x24283, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x184, 0x4000000000000000, 0x20, 0x0, 0x3, 0x6, 0x3, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x80, 0xff, 0xab, 0x0, 0x0, 0x6, 0x20280, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6ba, 0x1, @perf_config_ext={0x200, 0x1ff}, 0x2082, 0x5, 0xffffffff, 0x3, 0x10001, 0x3, 0xffff, 0x0, 0xfffffff8, 0x0, 0x5}, 0xffffffffffffffff, 0xf, r1, 0x3) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) sendfile(r0, r2, &(0x7f0000000180)=0x8, 0x4) 13:42:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSIG(r0, 0x40045436, 0x9) ioctl$TIOCSIG(r0, 0x40045436, 0x19) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$VT_DISALLOCATE(r1, 0x5608) 13:42:33 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000004580)=""/124) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000004600)={0x0, 0x80, 0x2, 0x7f, 0x3, 0xff, 0x0, 0x9, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x6b6, 0xd0c7}, 0x1000, 0x6, 0xffff, 0x3, 0x7ff, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x800}, 0x0, 0xb, r2, 0xa) clock_gettime(0x0, &(0x7f0000004100)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000040), 0x6e, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/118, 0x76}, {&(0x7f0000000140)=""/18, 0x12}, {&(0x7f0000000180)=""/38, 0x26}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000001c0)}, {&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000000240)=""/88, 0x58}, {&(0x7f00000013c0)=""/210, 0xd2}], 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="18001000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x70}}, {{&(0x7f0000001540), 0x6e, &(0x7f00000016c0)=[{&(0x7f00000015c0)=""/239, 0xef}], 0x1}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000002c40)=[{&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/174, 0xae}, {&(0x7f0000002840)=""/245, 0xf5}, {&(0x7f0000002940)=""/253, 0xfd}, {&(0x7f0000002a40)=""/74, 0x4a}, {&(0x7f0000002ac0)=""/183, 0xb7}, {&(0x7f0000002b80)=""/176, 0xb0}], 0x7, &(0x7f0000002cc0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x138}}, {{0x0, 0x0, &(0x7f0000003fc0)=[{&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000003e00)=""/240, 0xf0}, {&(0x7f0000003f00)=""/148, 0x94}], 0x3}}], 0x4, 0x1, &(0x7f0000004140)={r3, r4+60000000}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) 13:42:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) [ 1546.755789] loop2: detected capacity change from 0 to 4 [ 1546.772525] EXT4-fs (loop2): invalid inodes per group: 0 [ 1546.772525] [ 1546.798010] loop2: detected capacity change from 0 to 4 [ 1546.809545] EXT4-fs (loop2): invalid inodes per group: 0 [ 1546.809545] 13:42:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000040)=""/63) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)) 13:42:33 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x3, 0x39, 0x7, 0x0, 0xffffffff, 0x24283, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x184, 0x4000000000000000, 0x20, 0x0, 0x3, 0x6, 0x3, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x80, 0xff, 0xab, 0x0, 0x0, 0x6, 0x20280, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6ba, 0x1, @perf_config_ext={0x200, 0x1ff}, 0x2082, 0x5, 0xffffffff, 0x3, 0x10001, 0x3, 0xffff, 0x0, 0xfffffff8, 0x0, 0x5}, 0xffffffffffffffff, 0xf, r1, 0x3) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000180)=0x8, 0x4) 13:42:33 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:42:33 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000004580)=""/124) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000004600)={0x0, 0x80, 0x2, 0x7f, 0x3, 0xff, 0x0, 0x9, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x6b6, 0xd0c7}, 0x1000, 0x6, 0xffff, 0x3, 0x7ff, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x800}, 0x0, 0xb, r1, 0xa) clock_gettime(0x0, &(0x7f0000004100)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000040), 0x6e, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/118, 0x76}, {&(0x7f0000000140)=""/18, 0x12}, {&(0x7f0000000180)=""/38, 0x26}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000001c0)}, {&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000000240)=""/88, 0x58}, {&(0x7f00000013c0)=""/210, 0xd2}], 0x8, &(0x7f00000014c0)=ANY=[@ANYBLOB="18001000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x70}}, {{&(0x7f0000001540), 0x6e, &(0x7f00000016c0)=[{&(0x7f00000015c0)=""/239, 0xef}], 0x1}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000002c40)=[{&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/174, 0xae}, {&(0x7f0000002840)=""/245, 0xf5}, {&(0x7f0000002940)=""/253, 0xfd}, {&(0x7f0000002a40)=""/74, 0x4a}, {&(0x7f0000002ac0)=""/183, 0xb7}, {&(0x7f0000002b80)=""/176, 0xb0}], 0x7, &(0x7f0000002cc0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x138}}, {{0x0, 0x0, &(0x7f0000003fc0)=[{&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000003e00)=""/240, 0xf0}, {&(0x7f0000003f00)=""/148, 0x94}], 0x3}}], 0x4, 0x1, &(0x7f0000004140)={r2, r3+60000000}) 13:42:33 executing program 3: ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000040)) syz_open_dev$tty1(0xc, 0x4, 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x20040, 0x0) r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1f, 0xff, 0xff, 0x5, 0x0, 0x2, 0x8, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc7bd, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x7, 0x80000001, 0x7, 0x6, 0x8bdd, 0x6, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000080)={0xa, 0x80, 0xdf, 0x5, 0x8, 0xff, 0x0, 0x6, 0x8000, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x13142, 0x8, 0x9, 0x7, 0x2, 0x0, 0x4, 0x0, 0x3, 0x0, 0x100}, 0xffffffffffffffff, 0xf, r1, 0xa) 13:42:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:42:33 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x7]}, 0x8, 0x0) r1 = getpgrp(0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000000300)=[{&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2, &(0x7f0000001440)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}, 0x10060) r3 = getpid() r4 = pidfd_open(r3, 0x0) lstat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket(0x1a, 0x4, 0x40) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r7, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r4, &(0x7f0000001540)={0x6}) sendmsg$netlink(r0, &(0x7f00000031c0)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfd, 0x80000000}, 0xc, &(0x7f0000003140)=[{&(0x7f00000000c0)={0x1b8, 0x29, 0x200, 0x70bd2c, 0x25dfdbfb, "", [@nested={0x95, 0x8d, 0x0, 0x1, [@generic="0945fe692980c6e0e1c35fc0465ae3a78c0d3c8a405061a7d6d4b660de5dc17188db73c4fffd27784a889beeaedd378b799f634f63ef9048bcf38e3fd4cc36855aaa290ff56ace2e041c167eb0e8078f11db3ccbd50df498cabba44bab49f20164e6dcdd109a48f7176d980984b19847092e94ec7012584ecfaa0d90e52c4002c17de22f33a482b9b752d0663de34091e6"]}, @generic="1b8ddcd4d55b548da8d1a4a1bfcdf59ed6640d2d11c6a0efe6703e8c565ca3a7cb5ac06b53399bd649d9be5cc2d3f27dc33effd3fbcdbfabe9446b3df1610f5e", @typed={0x8, 0x3c, 0x0, 0x0, @pid=r1}, @typed={0x8, 0x58, 0x0, 0x0, @str='!*#\x00'}, @generic="a470f3832d7bbcb53bcd7a11a016d8f2357e7d7c753414075cffeb483471ba2732ba433c92dbe28fd471a09ed3d7417402be2881b358224a98ecd20f6789417604ba67eeec1eea42aa1086d39a4b14540766e133feecd4dd33250700e6ad9a39c43b3971a3fe3b015cdd0af228280e535ccbfe6bda854f9d38d1aebb1d64c20e238b0bb65727b5763efbcf1ddba81888c2c17a9531553d5e69575c300804bf02a5dc986e95771abe8206dfc96ac9210b817d1e96da7afb7eb700b4e388b0"]}, 0x1b8}, {&(0x7f0000002880)={0x148, 0x2e, 0x400, 0x70bd2a, 0x25dfdbff, "", [@typed={0x8, 0x52, 0x0, 0x0, @uid=r2}, @typed={0x8, 0x4f, 0x0, 0x0, @pid=r3}, @generic="ca59946cb5d05e666b81e7158764bd1b704069cc08bf1dc04cf93c585a36601709b666cfa5618eb23cc3a9bffbc8390f6d726c7926385571373d0e7007e6d1730ca817910e8d1c76d116d00123ef45fd6bc5a75a2d2ee631d5fc5ec9a0375ab7c9871f4608412ee50463c97e1a94ea48960d4f4e86d8dc5f1637fc2eab449a6f837c2d0c34bf008efc", @nested={0x9a, 0x1b, 0x0, 0x1, [@typed={0x8, 0x5d, 0x0, 0x0, @uid=r5}, @generic="f4f122dca84af6609e0ef8e4c6aacd9ecaa02d22baa83b96a4e883068a87", @generic="d241d7e711f27a2a7d2253b1f3b0f8526256a8dc671df92864395d1792a1a72336bef9b470deaa4c2a0e1e34a20a9ccb2b21767c39601c802f654648a8e13cd82f56b258e2d7c375f94651f97112eb2c716183066909fa760e038c1d11db1f5ec024e7f5f119d44e", @typed={0x8, 0x92, 0x0, 0x0, @u32=0x1f}]}]}, 0x148}, {&(0x7f0000002a00)={0xa0, 0x2d, 0x200, 0x70bd2b, 0x25dfdbfe, "", [@typed={0x8, 0x43, 0x0, 0x0, @uid}, @generic="2b7b85ae9d8a858709134801b45fe5966ca2c9aa94e65de8cb32489f6b65df0b8847beeb16f72815e7bd3f076fb885a6308ae21d4674851b1c9ff1934f5131da2ba2d0796a10d432b1498d1ae4ceba1e463fb785b7bf8b7141d634b2237aa86a3bc7035d2a08f3a98b5f02f59f1aec0cf068a6ace8ce06346de328b79cf1abf368207821391993a2"]}, 0xa0}, {&(0x7f0000002ac0)={0x350, 0x16, 0x20, 0x70bd29, 0x25dfdbfb, "", [@nested={0x114, 0x87, 0x0, 0x1, [@generic="b68f33638ee2c4d3ea847d5c06734889a510625a3e1a920019f692444674f52f4ba1577b388f272e417961bb33a312d0b7d066e28be90428c865159cb867d0109e12060e6c6493a1b4c3c286c24c8f5446cbdd9357f8573b136ff701215225aa203ff502a4f4a6ccb46d0e761280cef4cfdf03b018f91abe3947e16944ce17a97a7a0bc3ecf84bb629a4e41785b9bb83c1b60c276aba3155992e5264b423cc57e27a8076e550deb3c44ecbd8bce7a11e53769377135c27884078f738bb981d7bed147c5e0f73b3460ef8c312afd006d1", @generic="ab279a580257758bd71ada789af5eac8be87191de03d6f4de1de3c39f4c3218cbc8fc631a1631d6e9bfbb9bc85427081689dc83ef0d5be4f2674141d4438d389"]}, @nested={0x22b, 0x79, 0x0, 0x1, [@typed={0x8, 0x15, 0x0, 0x0, @u32=0x800}, @generic="d670d623b539ea8a566bb28f93dbdbd13afd9adb50420d1aead779a80c7c1d6ff1b1b28fe22046e634854660a02c1c98f58c825f79139c1a3eaff8e611b58471a76df0acf6f28e1aff8fec3ffd738d096c0d9c97f2d8336e9cb5a3e0cfdf48ff9097a799962f83eaba8af58e66aa5178e770779df1dce827e955825d002e1370d566bdd797cd8c1ccc388bf53f3e0bfab90f5473c196a42177290434d3", @typed={0x8, 0x59, 0x0, 0x0, @pid}, @generic="741ff6671e276b0b53c598ba422898ed509287fd67c5adf6573a02d812734f52", @generic="5121be756227c10a73de93a6bbe77c35c045c58e002935a07a354496ce744948b3e23d8570616419fcdce89ee0db75b962a175aa82d0678053", @generic="798ba7094c2d1d88bbd371f0af39c61bb348556eed0eb675eaa067ad0b9b5ee242dc3530ece8948e6fda95a9bade46ae980e8214a4bf879249895050614945ac9fe9e651672a95a1ebb75f5322895c92323572b233ab3f047e3bc7a9ee3c44dca0455b691f587c133e0155d322bea3a9b4fbe06f9e122e0ed10a95785fa523ba3c89d3cb4ea94d5b109c178ea5583725b9f25636dd0665bbcbf1a310f8bf5fc0bec56e12e3be853eea16630e7a061724f1b9a2725a1c41f4c2eece450e9f92074bb2", @generic="ba4e66cc49cecd79ec6e9bd8931bd9720db9dbf04f3b3d68835246ecc9e03f486f16cb60c9e3754ca1d09d9826ead420cdbdb61f654c2dd884f6057f1d4bc39b40ddaf9e45f1f43de2c73563dda915a447e7da0efe43f2594c01040b8906a4"]}]}, 0x350}, {&(0x7f0000002e40)=ANY=[@ANYBLOB="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"], 0x138}, {&(0x7f0000002f80)={0x194, 0x11, 0x10, 0x70bd2a, 0x25dfdbfc, "", [@nested={0xc7, 0x42, 0x0, 0x1, [@typed={0x8, 0x46, 0x0, 0x0, @fd=r6}, @typed={0x8, 0x2d, 0x0, 0x0, @u32=0x2}, @typed={0x8, 0x18, 0x0, 0x0, @ipv4=@empty}, @generic="9f1a0163e3e3d6d2f922a9047ccf049f49b47e2d79d79009c282dd719586ea632ea9b42a776d333bfbb7d82a0ca602096796f570040379c7ba1dd5a6c1b6744c0aadf31f8908ef3ead993d0c713a2333df86cdc70836ff2551ece0650f90f7ec0158fddb11e901c52483b01d5cde23465e29a8ae90d594975dee345f706cd562323d51d9239fb183e96e0170e8422ef92598e589cf60f57e71d23f33afc2d324ad977a245441d3208018e9"]}, @generic="2adacebe15407cd1292c1b435fd68fad2bc0ab0af0a93e894d4a3e7ffcf9f45561ea69fc00ba78f0ea200d3fcd5c6aabb30af158e59c6f136ca314b406dff6aa6956ce5a30d3e90fdf2585eb908a630479260c92b4a4c533e593cbe718c8e6def5a54a", @generic="d84468f31cf4bd8ef4f7ae13826fe080d1d2a328a72a6105e9f897004878bab15e854003a79f2fb66977711f2b9bf1da9466115ce3b2479c9cf636b3d090a0372043a11d4cb14fc51143fa1ce6d3d30e6b9eb30860374fce"]}, 0x194}], 0x6, 0x0, 0x0, 0x4000}, 0x24040814) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001580), 0xa}, 0x41408, 0x1000, 0x2, 0x2, 0x3, 0xffff7fff, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r8, 0x4b3a, &(0x7f0000000000)) 13:42:34 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x3, 0x39, 0x7, 0x0, 0xffffffff, 0x24283, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x184, 0x4000000000000000, 0x20, 0x0, 0x3, 0x6, 0x3, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x80, 0xff, 0xab, 0x0, 0x0, 0x6, 0x20280, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6ba, 0x1, @perf_config_ext={0x200, 0x1ff}, 0x2082, 0x5, 0xffffffff, 0x3, 0x10001, 0x3, 0xffff, 0x0, 0xfffffff8, 0x0, 0x5}, 0xffffffffffffffff, 0xf, r1, 0x3) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000180)=0x8, 0x4) 13:42:34 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) [ 1547.050104] loop2: detected capacity change from 0 to 4 [ 1547.068309] EXT4-fs (loop2): invalid inodes per group: 0 [ 1547.068309] 13:42:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000004580)=""/124) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000004600)={0x0, 0x80, 0x2, 0x7f, 0x3, 0xff, 0x0, 0x9, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x6b6, 0xd0c7}, 0x1000, 0x6, 0xffff, 0x3, 0x7ff, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x800}, 0x0, 0xb, r1, 0xa) clock_gettime(0x0, &(0x7f0000004100)) 13:42:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000040)) 13:42:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDSKBLED(r1, 0x4b65, 0x7fffffff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:42:44 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x3, 0x39, 0x7, 0x0, 0xffffffff, 0x24283, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x184, 0x4000000000000000, 0x20, 0x0, 0x3, 0x6, 0x3, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x80, 0xff, 0xab, 0x0, 0x0, 0x6, 0x20280, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6ba, 0x1, @perf_config_ext={0x200, 0x1ff}, 0x2082, 0x5, 0xffffffff, 0x3, 0x10001, 0x3, 0xffff, 0x0, 0xfffffff8, 0x0, 0x5}, 0xffffffffffffffff, 0xf, r1, 0x3) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000180)=0x8, 0x4) 13:42:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:42:44 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:42:44 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) ioctl$TUNSETOWNER(r0, 0x400454cc, 0xee00) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b3a, &(0x7f0000000000)) r2 = memfd_secret(0x0) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) 13:42:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x9f, 0x2, 0x7, 0x20, 0x0, 0xc44, 0x42241, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x8}, 0x4000, 0xa6ca, 0x4, 0x4, 0x1, 0x40, 0x8001, 0x0, 0x3ff, 0x0, 0x3}, r1, 0x2, r2, 0x8) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x2, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000140)=0xb329) shutdown(r0, 0x1) [ 1558.009121] loop2: detected capacity change from 0 to 4 [ 1558.025961] EXT4-fs (loop2): invalid inodes per group: 0 [ 1558.025961] [ 1558.045300] loop2: detected capacity change from 0 to 4 13:42:45 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x3, 0x39, 0x7, 0x0, 0xffffffff, 0x24283, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x184, 0x4000000000000000, 0x20, 0x0, 0x3, 0x6, 0x3, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x80, 0xff, 0xab, 0x0, 0x0, 0x6, 0x20280, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6ba, 0x1, @perf_config_ext={0x200, 0x1ff}, 0x2082, 0x5, 0xffffffff, 0x3, 0x10001, 0x3, 0xffff, 0x0, 0xfffffff8, 0x0, 0x5}, 0xffffffffffffffff, 0xf, r1, 0x3) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000180)=0x8, 0x4) [ 1558.065663] EXT4-fs (loop2): invalid inodes per group: 0 [ 1558.065663] 13:42:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:42:45 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDGETKEYCODE(r1, 0x4b46, &(0x7f0000000000)={0xfffffffe, 0x94ec}) 13:42:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000004580)=""/124) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000004600)={0x0, 0x80, 0x2, 0x7f, 0x3, 0xff, 0x0, 0x9, 0x8000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x6b6, 0xd0c7}, 0x1000, 0x6, 0xffff, 0x3, 0x7ff, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x800}, 0x0, 0xb, r1, 0xa) 13:42:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x661, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:42:45 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x8001}) write$binfmt_aout(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x739) 13:42:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:42:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x4, 0x2}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RELDISP(r1, 0x5605) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x181003, 0x87) sendfile(r0, r2, &(0x7f0000000080)=0x5, 0x2f) 13:42:45 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x3, 0x39, 0x7, 0x0, 0xffffffff, 0x24283, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x184, 0x4000000000000000, 0x20, 0x0, 0x3, 0x6, 0x3, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) [ 1558.226245] loop2: detected capacity change from 0 to 4 [ 1558.237805] EXT4-fs (loop2): invalid inodes per group: 0 [ 1558.237805] 13:42:45 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:42:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x662, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:42:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) 13:42:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000004580)=""/124) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) 13:42:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x18, 0x1, 0x47, &(0x7f00000003c0)}) 13:42:45 executing program 7: epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000040)={0x80002008}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, &(0x7f0000000080)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000, 0x3}) 13:42:55 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:42:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r2 = eventfd2(0x0, 0x0) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f00000007c0)=[&(0x7f0000000180)={0x0, 0x0, 0x2, 0x5, 0x0, r2, 0x0}]) io_submit(r3, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x2, r1, &(0x7f0000000040)="64ffb47ff34034f0cf32dbbc0824fc379dba6f0c3373addeb61348e5a61ca3f0b5b3f01d13cee6619fce5dde884789a68004aff9a61bc4de82829a7ae58bf33704d1f966dcd57dbaf77e500f72e463671572cedd13d9069abbd3eef23566f850d08961362ad089da438177ccef849c487473c48b0d5f7c1063181fde39d666f759af09aae40df8cf9e68a7ec08", 0x8d, 0x2991}]) 13:42:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x663, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:42:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:42:55 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x604040, 0x109) ioctl$TCFLSH(r1, 0x540b, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) 13:42:55 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x400, 0xffffffffffffffff, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000080)=0x6) 13:42:55 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000004580)=""/124) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) 13:42:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) fcntl$notify(r0, 0x402, 0x10) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r1, 0x1) [ 1568.157179] loop2: detected capacity change from 0 to 4 [ 1568.180436] EXT4-fs (loop2): invalid inodes per group: 0 [ 1568.180436] [ 1568.211426] loop2: detected capacity change from 0 to 4 13:42:55 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000100)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, @out_args}, './file0\x00'}) dup(r1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x81, 0x2, 0x5, 0x1ff, 0x12, "b384e3c89b36fb9d6edfbd97e54ed64d22d70a"}) r3 = fcntl$dupfd(r0, 0x406, r1) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x2) [ 1568.225109] EXT4-fs (loop2): invalid inodes per group: 0 [ 1568.225109] 13:42:55 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000004580)=""/124) 13:43:06 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:43:06 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x4, 0xffffffffffffffff, 0x1) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="01000000000000002e2f653000"]) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x8400}, {r2, 0x2}, {r0, 0x400}], 0x3, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140)={[0x9]}, 0x8) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r1, 0x1) 13:43:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0}) r3 = getpid() pidfd_open(r3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x9, 0x20, 0x6, 0x0, 0x100000001, 0x2144a, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x1800, 0x48ae, 0x4, 0x9, 0x400, 0xffff, 0x94, 0x0, 0xc9ce, 0x0, 0x3f}, r3, 0x2, r1, 0xa) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r2, 0x2, r0, 0xf1d1}) 13:43:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) dup3(r1, r0, 0x80000) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:43:06 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000000c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc08100, 0x9) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0/../file0\x00'}) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000140)) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:43:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1000}) 13:43:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:43:06 executing program 5: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x250081) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000040)={0x7, 0x3ff, 0x7, 0x1, 0x8, "678708253ce02614"}) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000080)) 13:43:06 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) [ 1579.359622] loop2: detected capacity change from 0 to 4 [ 1579.376861] EXT4-fs (loop2): invalid inodes per group: 0 [ 1579.376861] 13:43:06 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) ioctl$TUNSETOWNER(r0, 0x400454cc, 0xffffffffffffffff) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b52, &(0x7f0000000000)={0x1000}) [ 1579.396177] loop2: detected capacity change from 0 to 4 [ 1579.403940] EXT4-fs (loop2): invalid inodes per group: 0 [ 1579.403940] 13:43:06 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:43:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x880, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:43:15 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x4) 13:43:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x1001, @none}, 0xe) shutdown(r0, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r2, 0x40047211, &(0x7f0000000180)=0x2) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 13:43:15 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r3) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpid() pidfd_open(r5, 0x0) r6 = getuid() r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x13d) read(r7, &(0x7f0000000040)=""/102, 0x66) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/102, 0x66) r9 = syz_genetlink_get_family_id$mptcp(&(0x7f0000001540), r8) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001640)={&(0x7f0000001580)={0xb8, r9, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x26}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}]}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x9}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010100}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x6}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0xb8}}, 0x0) read(r8, &(0x7f0000000040)=""/102, 0x66) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0), 0x10200, 0x0) r11 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000014c0)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)="c52f967f91ca22771e5bf43a58544d7b5287f1a1ef88892d62b947ccb9bbf58deb0a0fc0b5ea118bc34dcc3683f58e949ada7ffc232ccd80ce6e23cf05c36c8ec03507b5e6e17e39e7b63ea55e14ae1f914dbd056305a6ce42bee864941e97e9f8475dfa14e5faa73eec7be66f73ed9dfbc53ed882bc74a810cbb78c1200dde9915c06e9b1d9a1d54627bf65376738a996238cf4c005ad0c8598336962ed941fc93586b75b38f62eec892da33695d1780c9a80f5fda5d1f32262502e19e99b6d9ecdd82916df979cbb9dd64c21476a3d4cf22b8bbbaa428cb32c2742f66ad4c8c75c715dc491d9a515648bb47ad76c7a0cc694deb40758d077f802a48ac07c165659efdb031fb301c2fceae6dc620911fc361852567f71095dddec416a2152dcee290329d561bbb32cab69b1c3e06d73c642861a1741974263b78385a3c7093a46cdc743ea4c4fc53927a578348b25f7837b8789285373bdb1c7097dfb7a56d4e9cc1935663a96765dccea13defee7280a246ae3d7c90d7411de8e628f56e8d9a80786be5ea6f3a272c0a4465fec879c2d8274e2083c7cc6bf307b8a5fb337119b42fa1203f4ebb1f968393c9977aa4f07363b3e7adb4985ec81885b30a6574eeb67a994baa98abbd3721c6508ac8995e99e36c7315be169e5b0a39a4f828ab7c1caabb4656d98dc849d7c2522dc722a4a3731c24b8d92fee983d704817778aca8be1877621e9f589123f96b4655268c23f20291c2a2d174719f690cff477a39e1b4d8ef2ad21485423c15a2f478dbaa892fc120a1c73e876c820c14cd97df799f458289467d85cb956befec0a34ded7a2190db123eddd4fae3e41b6b1e250ea261afa18544acb9119a50261d149f6a85bda6d09bef067f830a598a4ced38bd3321ae420cee955d1c1de1412581deb83b32704aaeb2b27c211958fa90acb7b47d235385bc48776637cfed6da9f0ed3c85f58475d18a9c32e6fe2ccce5a3061a29665304f23748387716767f8cf1e4352132a3f2c512f529b878aff2f66e5951af2ef88e8a1d2302791a416da02882b21db4ebe6bb9137a1e74b706df13b7fb3b60d0ef8cfa41bb7e8817270d9952f0844628b4151c3312c2bbe1521355e2c3c559fc1c1971593e8c1248ec8a546984c62c0c3f93996c5ec8b1697e0c0cc841a307fa8d86b17b6c53ecf73686ec3911ec3f332436919e4efdc498107aac864a353191f511d0d7eea04b98241d18bbf44c213e6c5098c654286f06e76d832425e5d25f04436a7aa394a399575b843c465215b935fc61652cb8884564b7da625831507b6beef73af160e9b60ec4352fc3ffc25abe60af3745272b857bd254f5e3bc95788eae97ae2021fb5af5aacd42596cc70149081931e8956600c9f74fb7f7eb5a9ae99ed344d1c45c2bd15e1ced82c29d66d290251e98f0580c2f768e3999c763d661c260a5c57486aef3a056bd0603729c0f696844c7a700117357b4f1a1dcecf0bd6ebfa7efe534d8475abfdf77ac6390c34e7452c3233db5e23b0cde214590d8c1a5013249e2662d8fa1e87ef38cda38bcd913447a56d7c3fbb7fe65e6baaa58aa865531f7e021be0357d0d3126e283423b7b3a24b5f40b4a5236492f5d501fa2d9622ac4b966484a8dce55ecfae15947fa60aa9010f16b0ae24f264b5e69897437b7ae731c12478316eecb939fa4b5d2d8fdbd48a9f9e2a6cbfa7851ae919bd7312ab7ac85ecd2ee74d1b4b9e3e9702814c9effa651c693ffc47d59158b87ac2117f26e02aa737a1322153a3aab135f45d4cafa06e359ecd5db29983554f8d5c296189b8215ee2ee6ce846102f81faa34796b24d43456527d4ed1b8609c69a3eb33deebcc390f68094276f744b4062b1d0e9d114276703307ae4054fa699beb796420a57955c8548fe5c438fffd944f437bb97b50be9a6d0ca258e3ba545dc9c5b61bcfc2026dfed1950aeeea2ce25f6ec6ba67f3b2c274d1593993986c6a454d9411f22f5ea82c3ef98de95822e2418ec7038175fc00e391b5a52702d6a8a21a312177fdee074c379b5e0451f519bcced41ac9e5f65a35f3def537ef6a8c406ffd66c974d538c247857b9bd23b28860e0bd9ffa33864b59b6a714030719e9b45ecc742934aeb1dee8300c4ab2a45bca9837d1e278bf0d832ee846d6c8b277e4d3c0ebb5af09967b00a0aec98f8afb63572ce5ec3ae9b6a003bc4671e9771ad58cc288c45cf8f4bfd4a902a24289eb2ab0564c680323ad85f59fa6ee39f4eefc9f0536fd59fa14192249cc21797d06d7c9f82b996d161f7ca1d1f5d0062d3f511a4217eefd66c8e0d63605ee72cf06c322dfbe277c313e0568586abcbd61d9fcd2d6da94c288a0acf9138b13ffbfc2d93c1e6d4166d138b684bd7af2fe9faa3e68ff94c64db2a8f85793398b3dc0e647c2e759bcdd4b10204350044befc4dc343230511aa06b45e8cc3b207a5189eaff823a0b229b48adde5ac177170d435551c30b8249607bd0d9181c941ee45051e415096c952aafa9942e1e8b6aa43c28838236aafe04c0322461ea7be67b8e9540d2910995bf81a0627589024d6b2b522c9e1ed97bc91dc83b81c8662a6b599f3faf7cccedd0c638e0f7ba3a5b6abd4bfca9e736671f4ac4dfb7493341af6fe93c394ea59522f8b761cbbbcd1170f6c9304943a05ce85ff48c64f7f21561f0d086e7dc8f5b34529e9dcde1bc1fb50cfdca01118c71c862b1d23cc7dcb5fd1023aae6a3eb01fbc5c91b80fe6331adbe67592b4665f29dec1a3702c84d7acc3393e1ea00b490afe483732de5deeed10a5d41b97fe389e3ad383970e24ea71a15bbc8afe8af8c46c7a86b7c6564a73105deb430915cf10d1e1c9d6739570935215c31d1fb22d2196eb4ec236a8cc1797e8205063c793b759f63134a1e63aabc4ff905c53ed4fa63a81f6003b569728f3f9585273f3856f93bb628ba3f46360fe38c32da2e090cf214677ee2a5cb7d34551dfe0c1395f19c82a5112103f4ed0fb687d4348bc9bf261ccde3b7fe100c041744ccfd24f454aec973c8127a854cac6c6a205d2f2feb369ef00838ab79eb8c8cd66d497090dc5429126336d083fea99037be105d899f9565f8b761d3a606baec1cc2a01da144fc1fdeeb654d1fdcaeb496214156dfc308bd68cc19089853a80b84ae23f1ffa20778c559a933c441bdd7dd801167a76fbb21b2a091eb9efc18f4128e9f7a8d7214e774917f0779645703ef1ad29de2c3c245d4915ae22c45a8df6fc53166c16084c2670c7f6cf5ca826fb644ec5ff9468695cfa6735e6a536f98843b4626497565a980dbab243fcafc7a2f17bf3261c3af971a10ea3146437965454f4e5c776988c2ed7f9b86b4bfdd963932f768a8c0a13626c33fac6ea919283a0a1adf89ce7f58313fde33d49b8a9968275e06bab3e64f2bf94124c7f067fe89083f269af908feda71d0aec5d5352bcc85da065e71928d0a1a2d713beebbf59ce19546c498da6a45b000a52545669418460155b2c44db381aaa7226e80d377e4ef74f1a3c8130d39cdc41b1e0a4478827c8aa35d2404a616934b6553895ebb91ee91add96fd26cf3ef686ea19c1c3c9ef9328a8c7937de02f59fd2392712be6d0a51488070bfec7cd759a86ce8793cb149c5e6077145083594e25e4bc6d4efa16fc4dfe9dcf3cecf3098b20574691b513413e5a2904d1e150d311fdb70c0db3e5fb91c236ee1bc34714a414a7b74c5a7174a612e80c83daf00ea28482e2e5f9b3f6f60a42e50145970e1a3472af9123e0f38efd9ed768ec844f537a663cb102e8f66966da3ef9c67e628876ad7d3e431533648239d0d607dbd279c2c0a3a5329c8997007fb0447ae2b1e225e3ba533c9c16d6f05eab5a85e0dae20a1296cbb51157b05aa519dc17ba4253c7f0aed4d98421ea4ecda67131572693df6aa872ae5dbed2b8fb15d27095d63df53fd298669a23c1b3d7ed5db2465b31e755c8828ff4f06d3df789916b96842afbee7dbb8dfbe61311b993e18a895dff1fc04e40dead54bb5980efa1a61eec8b6aff99eb27fc2d76c4f94feb66f612c37be1e687b99f0be9167b777b1bf8404ba742274afe610fd9beff5b4b65d8f636686e35ad48ad87e0bd1b3533f4a2e6ddfe2ca9de4a4879f68b73ab42fcacccf4bf6b6b38d4d742582653f96f75a737924f2a2edfa37ddb1c86a1d4af9ad52177edad43d29338fafada1bc5feae00933dc5bf990738611314230b9213b0aedd77cdb7763ef4de4a0f72d7542e6d82c3182bc3bc2c4e2bf2c35b99090c9baccc8ed2cd7096645d768a99de5c93194e6213f133bc643a0bfe24b9d224e573136ce9fce1fe2c6680ef8f0b417d92b8b251ad853ebf0a07f0094b9981d3c1ab1609aa120925fc09854b004f93ea677e66ca0fe0c408d768a6588a8e9aca500adbd442c4ffeb530910160b0dc1201f295c7cfddd3da5b0774dc8b3b1a9f958ab74f664dd196e0d1ba47598e1c9fd2319da737d05f00101c2e50ce857d16cb88c43c7ca996b7ba4f5469577935aaf98350538ed4b05fc214b15169d812a25dabf49b834495b37e2c59e0f9e5374bd98f7af79361fa5fa9d4307de0de3e79e9feebda217c0a8a592bb2f581e56090cd7aabec812ea7c48991ee76d47ae4a3f40b3bcd63e7f6875be154594599e9993d08afe35423b500cb3ac97c1f9c469b5646eebc824d394d8ee01c4a2ffa369169fc824f592cdb6343bc97d56dfeeb69b027293945cc01b0a751c5ea064f1b35dea7bee69d09ac1ddff802a6f99cef5041bbea4faaa798936b63527781085a36c3be6e018ca82969851ed2cd2cae2fb1fd266858d6452a5bf35a467ba05ab3a3a65ee2f9ef2525bd4fc0901b7865174ab88ac77da923e5430e0af17a16668467312d679cf31ca3357a2a022bd5971e345168e48c8b3ce328db6c156fe2c19f9a540d300945f7771a63543d477cd9eaec02271eee5e2a45452434acbe79c28181a9342d59aa1446986f0da3425e491014b088477b3877e56b41d716140939ba7b9b5e8eb4e2568ad47183cf1611afa72492da6ac7522f07f229feba7919b148968646401288de46d9b115014d8c60a367cc74da69cc24944f4281a138dc9b742e5088536abc0207c4858a10e21fbfefbbff996487d3b9d0a58415cf7b508782a881e6921b8ebdd36ed71c2334c31e2aa89df4e53ca14ab80c2ffd2ddbcde0b608dd785b83313a212afc625aeb354877efce67bf8d9b1fb7857dd81540107193bdb29ef7786ba56472b998607a12f0133977dedabbb9331b68660b3b72dca1b91036f730b45a6f174e204038909b0d6125151b4ca657279e57fc1dab86d58979cd1dafde46bead2a656152857b33f6e94d1a7d609a0340dbf0d7c3770acb93f419a810dbc64fe8d7a78ff3288fec2bec18279ffa0209881a08f0db74b90b58fb80b41dd20e295c7ea1c66a6cab47583b32957210619e9368aff5641a9332fcf160e278616b9863e92de1310875b3b13f78399c55b742a28953b5e9d3568bf9591cb49f7cb8bb98baabe04d91ef179722e8ef70a31458b80b624ef356433f09bf949510443e598cae0bc8b7d28bdab94a762ff6a1914f42fac87cc25c612a507e56878d4e4c87473d878d808f0eecffc1e579acee921ff438dfe61c0ff1827d36e6f7d5e06753d29c908748d858210c53a6469f5016f984bb0a9876cbe8fb4ea1177408053bcb8ce4ee188c3913ebfcd42257e51d776a93f0386052ccabe1c86e1a7a820a53b6b676461ae9ef4ca1d9d845728cad67032311a3139", 0x1000}, {&(0x7f0000000040)="17bb6401557a9400970a28d5d2e22f192e6350da7c30c20287ea1a2e67318e66dd8d9e466b2cbca75d52bc7bda8b678dc5311a1f929e399e37ddf3af4f74501bf7e2cdac6b841481ddd870ae774fff506332dfbf72f66dee7b38ae49aaab6bba0602da93f3f833bf2af81bc875040e2a3e2618c097f8a1062fdcbf08d79f0af174ed7ab0e83516d93470780428da46c110a0c6dfffc05220657fcb1ad5cfbdf867fa853dc0bb86d5ff3531fec0950d31fad15c4e", 0xb4}, {&(0x7f0000000100)="1a21beecc9da524a638e705312e922291411aafb77cf3520121733e7f7f2385a05b730262c62ddc4", 0x28}, {&(0x7f0000000140)="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", 0xfa}], 0x4, &(0x7f0000001400)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [r7, r0, r8, r1]}}, @rights={{0x14, 0x1, 0x1, [r10]}}, @rights={{0x14, 0x1, 0x1, [r11]}}], 0x90, 0x20000004}}], 0x1, 0x1) 13:43:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCGPTPEER(r1, 0x5441, 0xfffffffffffffffd) ioctl$KDSKBLED(r0, 0x4b65, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x4, 0x0, 0x1, 0x0, 0x41a, 0x10000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x5, 0x6}, 0x1000, 0xb66, 0x5, 0x8, 0x9, 0x1000, 0x3, 0x0, 0x1, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r2, 0x1) r3 = syz_open_pts(r0, 0x20a480) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000100)=0x1) ioctl$BTRFS_IOC_SUBVOL_CREATE(r2, 0x5000940e, &(0x7f00000003c0)={{r3}, "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"}) 13:43:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000500)=""/111, 0x6f) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000440)={0x1, 0x0, 0xfffd, 0xb, 0x1b8, &(0x7f0000000040)}) 13:43:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x8, 0x0, 0xfc, 0xfd, 0x0, 0x0, 0x41000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x44144, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000040)={0x1000}) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x9, 0x7f, 0xaf, 0x4, 0x0, 0x5, 0x200, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x7f, 0x5}, 0x2101, 0x5, 0xfff, 0x3, 0x864722a, 0x1ff, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffff7}, 0xffffffffffffffff, 0xf, r1, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) 13:43:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:43:15 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x4) 13:43:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) [ 1588.742943] loop2: detected capacity change from 0 to 4 13:43:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r1, 0xc0286687, &(0x7f0000000040)={0x2, 0x0, 0x1000, &(0x7f00000003c0)=""/4096}) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) [ 1588.758897] EXT4-fs (loop2): invalid inodes per group: 0 [ 1588.758897] [ 1588.788810] loop2: detected capacity change from 0 to 4 [ 1588.804972] EXT4-fs (loop2): invalid inodes per group: 0 [ 1588.804972] 13:43:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:43:15 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x0, 0xfffffffd, 0x1, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:43:15 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x4) 13:43:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:43:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:43:15 executing program 7: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x38, &(0x7f0000000000)="a94a128f", 0x4) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) r3 = getpid() r4 = getpid() openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x200002, 0x0) r5 = pidfd_open(r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r5, &(0x7f0000000000)) r6 = getpid() r7 = pidfd_open(r6, 0x0) kcmp$KCMP_EPOLL_TFD(r3, r3, 0x7, r7, &(0x7f0000000040)={r2, r5, 0x8001}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x1, 0x8, 0x5, 0x5, 0x0, 0x3f, 0x8800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, @perf_config_ext={0x4}, 0x5, 0x1, 0x1, 0x7, 0x100000001, 0x8, 0x7, 0x0, 0x7, 0x0, 0x9}, r3, 0xf, r1, 0x0) 13:43:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) [ 1588.966795] loop2: detected capacity change from 0 to 4 [ 1588.976873] EXT4-fs (loop2): invalid inodes per group: 0 [ 1588.976873] 13:43:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1e) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000480)={0x1, 0x1, 0xe, 0x13, 0xb, &(0x7f0000000080)}) 13:43:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) shutdown(r1, 0x1) 13:43:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7a, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x6, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:43:27 executing program 0: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:43:27 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) r1 = perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x7a, 0x0, 0x0, 0x5, 0x0, 0x0, 0x80400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'gre0\x00'}) 13:43:27 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:43:27 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:43:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 1600.222494] loop2: detected capacity change from 0 to 5 13:43:27 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:43:27 executing program 0: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) [ 1600.296828] EXT4-fs (loop2): invalid inodes per group: 0 [ 1600.296828] 13:43:27 executing program 3: r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000140), &(0x7f0000000180)=0xc) syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x15}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b52, &(0x7f0000000000)={0x9000, 0xda4}) recvmmsg$unix(r0, &(0x7f0000002680)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f0000000240)=""/101, 0x65}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/181, 0xb5}], 0x3, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}}, {{&(0x7f00000002c0), 0x6e, &(0x7f0000002580)=[{&(0x7f0000001580)=""/4096, 0x1000}], 0x1, &(0x7f00000025c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb0}}], 0x2, 0x2, 0x0) [ 1600.312790] loop2: detected capacity change from 0 to 5 [ 1600.322644] EXT4-fs (loop2): invalid inodes per group: 0 [ 1600.322644] 13:43:27 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) sendfile(0xffffffffffffffff, r0, &(0x7f0000000040)=0xfff, 0x4) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r1, 0x4b46, &(0x7f0000000000)) sendfile(r1, r0, &(0x7f0000000100)=0x6, 0x3) 13:43:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:43:27 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) r4 = socket$packet(0x11, 0x3, 0x300) r5 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000080)) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r4, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r7}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in=@local, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d80)={{{@in6=@private2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000e80)=0xe8) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001200)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="40000180140002006261746164765f736c6176655f3000000800030001000000080003000100000008000100", @ANYRES32=0x0, @ANYRES16=r4, @ANYRES32=r7, @ANYRES64, @ANYRES32=r8, @ANYBLOB="0800030003000000080803000100000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="080001006e0a45dfe8bdf1b1d3d1b4841d75e1821184c5c8e1924941068687e68012a63c132d810c426dded91c3ed6c5cc12e02fbfe825d9751e3facf0e28c2536c55b79f30cf6c4588b77864a84ed2ed6012077", @ANYRES32=0x0, @ANYBLOB="14000200766c616e31000000000000000000000008000100", @ANYRES32=r9, @ANYBLOB="04000300ec000280240001800800010000000000080001000400000008000100020000000800010000000000340001800800010001000000080001000200000008000100060000000800010004000000080001000200000008000100010000000c00018008000100070000003400018008000100080000000800010004000000080001000000000008000100030000000800010018000000080001000700000044000180080001000000000008000100060000000800010000000000080001000600000008000100050000000800010005000000080001000200000008000100070000000c0001800800010002000000200002801c000180080001000100000008000100050000000800010001000000"], 0x340}, 0x1, 0x0, 0x0, 0x8000}, 0x90) r10 = syz_open_dev$tty1(0xc, 0x4, 0x1) r11 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r10, 0x4b45, &(0x7f0000000000)={0x1000}) r12 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x14, 0x800) dup2(r12, r11) [ 1600.463203] loop2: detected capacity change from 0 to 5 [ 1600.475719] EXT4-fs (loop2): invalid inodes per group: 0 [ 1600.475719] [ 1600.488078] loop2: detected capacity change from 0 to 5 [ 1600.494576] EXT4-fs (loop2): invalid inodes per group: 0 [ 1600.494576] 13:43:39 executing program 0: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:43:39 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:43:39 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) getpgrp(r4) r5 = getpid() kcmp$KCMP_EPOLL_TFD(r5, r1, 0x7, r2, &(0x7f0000000100)={r3, r0, 0x5}) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x7, 0x81, 0x4, 0x6, 0x0, 0xfffffffffffffc01, 0x40004, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0xdbf, 0x9}, 0x1, 0x2, 0x2bb7, 0x5, 0x101, 0x10001, 0x7fff, 0x0, 0x9, 0x0, 0x1000}, r1, 0x8, r0, 0x1) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r6, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r6, 0x1) 13:43:39 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup3(r0, r0, 0x80000) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000040)={0x8001, 0x8, 0x7, 0x80, 0xc9, "51bdf96c9f608b6dc47bd8763cd1a665e9b168", 0x400}) pwritev2(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="8c1ccb42071e1b21b6c1347460234f5223b79dd4bbeefaff10651fd5f83f284285a9e5d344ae587f5d8bf6f8a70257195b1102e2d48981bfc24978dc05c9910238c4d111fd30285af04a496fff8c0a7ed7857361a4f9aa6f9ee49a2e35f0d1364664d499d08a50e2a389f1bc2773a056869c62bb8dcbc88ac8e3d4737ebf3c8d919289b2ae2ff3bea46d341da35ca71328fe603613f6a675665c7e1d", 0x9c}], 0x1, 0xfff, 0x4, 0x1) r2 = syz_open_dev$vcsn(&(0x7f0000000280), 0xffffffff, 0x88000) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x3}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="04002cbd7000fddbdf25000000000c000300040000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000400ac141413080500ac14142e0800010000", @ANYRES32=0x0, @ANYBLOB="0c0003000300000000000000"], 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x11) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r3, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@GTPA_I_TEI={0x8, 0x8, 0x1}, @GTPA_NET_NS_FD={0x8, 0x7, r1}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000000}, 0x4) ioctl$TCSBRKP(r1, 0x5425, 0x3f) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r4 = dup(r1) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="080000000a0900002e2f66696c65300032a80f88d618a655f00c0e40ac4bb30af32d7bb1ec0883aafd3e5ed2e0d6b9ad7c93346c414eaf0fb4b9d0d04bde6df946873189d4a0daea963d75c42de0d1b6788503abf002bb674730"]) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x6, 0xff, 0xf7, 0xff, 0x0, 0x4, 0x800, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000180), 0xc}, 0x24, 0x1, 0xd1a1, 0x4, 0x9, 0xa3e, 0x8, 0x0, 0x5, 0x0, 0x1ff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x2) 13:43:39 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:43:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:43:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)={0xed, 0x13, &(0x7f00000003c0)="6d2efc4ccd702194ab299b6d66ed1d21f9c2ad15d1aae627cb04c4b2faae165967bf0a01598a70893384e45528939314ffb47a7cfb210b9b295966e2db91e70d718b335535b7f4144607179aa1704f53adc26b5b87b5e29f62bdfd8827900c0b6d52b8d3f08a896c9018f7fb12c10192d7c2d450008a047a943d1b65e0ff51528c0dcf7a38509a062df38b87c5392e090e6099a873377196ae36de3b87f2da4ea4fc0c700352c68cb3a897f6e74e686f970886fa5915fdaece14c52b41e63c0393948a79309438c008497bc5794800cc5ecf3ae8abfa751576b081f0f76b3867fbca476cb40da1df91463d56c55b1009f525654e9407234c171417c11d5c96129efb0cc82d2ae89bb07933f2cfc1c1c19714871ec5e59268e2a0f6c95cb10413deab5e4a0022ec72e88dd1a81e728c24ee190b563845fc39c87074a58bd1456a5d79fa1dd37c1dfd4f0bd12de2a13b21530264cfd076e2a5519e81d861786d87d310748838c717d115b9daadf6f8171b1868d08f36b84f7c07b7af6ff4e32e01fa494a2c034155edc3f34ceb5e11945aad4786c95804e3668c201fb9dba5b7098d5213b383387d1763cbf5e41beef399c7d589b3f0915cf7435db95e3d0c4d3ff299fc34c9f01c5a9397e6c26a921c259a5b1ac2b8db5edc35e462058d6377990b50ff12e88c2f9a3a675e06e0d2d61a8b391a88f98a1b52932f71ed2db7d58dcfccba20b42815d670b8c97698d25595138da7951572d6d8da21fb95421143141c9864f1f122875c5db72e01e84d0aa658733e61fbe7de49c753680ca7afdd7ed1c6ebf63e58603ef22850db390324b9cbd36a34abbcaa0f10bc4383899cc7a8504f4f3140f20b8eceec0be8c67e9a6649812645331eeee3d5d96cd45b0c517fda226a2a1aa6428300eb0dd80387f72eb674c6464e0edc7f4629d5287c451f06e5e19cbb814d18296da4bbc12a2bf865cbf9ae9a6966d7dfd461541c7527f960eb7fa87a3d7afeed0f3b59cc203e9e2501c6e9fcbfcd6ab097aefcc7c2bbe4a8326ad5521252e28cd0c16c273fbc6d85faa5f872495a22ded019a3e6f8ba207b1797aa1ddbc017cffb2a26583c95266c9556c71335b1d7e4eb35e30b5cd5d6e82a9d06d7294e32de2256e775de43dda2e456800fec6637fd0cdea8256d20b505709fe0f36e9dc7709004aa2d67b7b8d2a3371580fe62a477520ae96e38d015c2b5d89b975e93575a8843af12444b5e5ebdd86d1417d25bed2ec4b56899ca917812a8cb26672091d770a7818b47e7313f98e679a36f17e00af3749199aa48f155a7b09199c26b0c2c8a1857b7cab86772094ab16d3264f369c8ee7c1c3998b2cc763f81e6618037ec99af0e4b148c4212c9bc0fdf338df605a5bfab4db04f40986e4cf3ec3d14ba2da3e4995bd8571691efb9342e56f5b86facf07b47ccf7c5fa"}) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:43:39 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000080)=0x9a) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket(0x10, 0x80000, 0x101) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r2, &(0x7f0000001500)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000014c0)={&(0x7f00000012c0)={0x200, 0x0, 0x1, 0x70bd2a, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x8}, {0xc, 0x90, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8}, {0xc, 0x8f, 0xfffffffffffff4f5}, {0xc, 0x90, 0x800}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x9}, {0xc, 0x90, 0x7}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x10000}, {0xc, 0x90, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}, {0xc, 0x8f, 0x40}, {0xc, 0x90, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x21}, {0xc, 0x90, 0x3ff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc}, {0xc, 0x90, 0x8}}, {@nsim={{0x3e4b6624ce310091}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc, 0x8f, 0x6}, {0xc, 0x90, 0xffff}}]}, 0x200}, 0x1, 0x0, 0x0, 0x20000084}, 0x4001) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000002b00)=@gcm_256={{0x304}, "8308720883f8f7f2", "5574ce430165b467432396cc83bf843770cfb9189aba910b3e85b3ff9c5c9e03", "d4c76c2d", "dece74623b662f00"}, 0x38) r3 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x7ff) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000040)) writev(r2, &(0x7f0000002a80)=[{&(0x7f00000015c0)="0e8537a4d18c94bc6cccbfc24af3638b549e605357458bfbca502ceff1eaa332137f56b7dc8071ae8afc730a813fe927c0c59734b0aad102868c36cc63e1ac185897b731", 0x44}, {&(0x7f0000001640)="a75217840177db8df73e6fde195441823fe3a9254a1807c365602b2c35204982ae7ea4d7f6648751d779ecc0a69d078db9559576567f273b6eac67cd922952b9bebdb81a3e45ccd3f1aad453c292148d10efd1f99df17f29f598d19105da30b3d58c6e607ea91e5a9e616a4f9a6c5cc4d24a753361d30e8ffdcdefdff439654520afa02fe46104261b658ae05e1cebdb9750edb78a2f49f63e5abea6c10d01333a4a93b536b2d21ac8dd32f67a7a8b375f29ae8d4b", 0xb5}, {&(0x7f0000001700)="64fcfe1eb09d04c9cc5c5f5b34c2d569128bfd888459309bbed00a101757d1f154e2e92f43bdfd117d93b305c358509af127f6a50ad79213b2cbe64f7dd6049c9d8fba0c0d7f9d350351ff52ae581a576f4bc4ebcca516f7fd6196a3db45c5a1becfe8f869d1d3ca5efc5cfd9cbc3c4b2702fb8a83de753da726bcde1373b90916b35c6f1e58508232cf76e869ffe8", 0x8f}, {&(0x7f00000017c0)="f4abc63d04333a59639ccdab1b00a39b284e9ae86eaf2c79e259bdac4801056ac995f6d0afe7190116bcbc5a11f09e351030c56a4ef987", 0x37}, {&(0x7f0000001800)="d5f113372146a5914aa40e493979406a507acc72634291647983d42956bfef5a25f53e29593b45b0a0a1e072a899ddb86ba245eaa572d004c5c4e25eeda0dd341fc2ec7858ae14141fa850b513dfbaaebb72bcb1472f0a23ea19c0236bac66dd5ed69daed1d12dd24b772b3ad4efe903bd69c018b67af1d390d64ab4ab046f79875107bf62b04272e6adf52650cd15eb859ad65e66f58369bd583ad364ca2159edcea851f65d2f3b50af5dcf95ae294bef865f6f5fa759b266034f24c7a399c6", 0xc0}, {&(0x7f00000018c0)="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", 0x1000}, {&(0x7f00000028c0)="2264bc47056be803cd5c66a0199906b555c1283790d3911886986c7b7f6b6b3436d874f72bbeae90762357012dc2c80f39d31001089c86ace47bb014828b1a5c754423edd003af3ea5898b08d35429ab75fb7615cd2432dca6cdf77f51f7796831b40ed6d23dcc917c74d61e664dcf9e9d5abbc8c64a4b0a532c30cf69a50514caa6b216c2a757ce0fffd27e3008097504a20184bb739e97cc303bb82a0345958e987811c19d331b1da5c854fd2bca9d8f37b1a6cfc660b73c58e25820b3ab8a9129e6bc26b1def168408547ae14d7a739", 0xd1}, {&(0x7f00000029c0)="285770ab07319c3f3513f8e3c36b485e1e5772197f1ebc1643ed8e6513ed538091da6b7bb11dffe279c714e10af906fcdb1e743c987727731335940d4a28e27964bbcfda1c3e2fa5692545487a3014bd0cf6ddcc26b1abe45b8a07132ac71c1813b055ecb7176bd1be4004af72517bf6213be0d7dfd9d91a7080d2166f0f5ddd9b8c3eae35596789702483e711f3694e50675baa1c55661f", 0x98}], 0x8) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r4, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f00000001c0)={0x4, &(0x7f0000000180)=[{}, {}, {}, {}]}) readv(r1, &(0x7f0000001240)=[{&(0x7f0000000200)=""/29, 0x1d}, {&(0x7f0000000240)=""/4096, 0x1000}], 0x2) ioctl$KDGETKEYCODE(r1, 0x4b46, &(0x7f0000000000)={0xfffffffd, 0x2}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000001540)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32=r4, @ANYBLOB='\b\x00\x00\x00s\v\x00\x00./file0\x00']) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000001580)) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) ioctl$TIOCSTI(r6, 0x5412, &(0x7f0000000140)=0x9) [ 1612.568545] loop2: detected capacity change from 0 to 6 [ 1612.589111] EXT4-fs (loop2): invalid inodes per group: 0 [ 1612.589111] [ 1612.609070] loop2: detected capacity change from 0 to 6 13:43:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) [ 1612.630051] EXT4-fs (loop2): invalid inodes per group: 0 [ 1612.630051] 13:43:39 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:43:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$TCFLSH(r0, 0x540b, 0x0) 13:43:39 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r1) setreuid(r1, 0xffffffffffffffff) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r2, 0x4b3a, &(0x7f0000000000)) ioctl$KDSKBLED(r2, 0x4b65, 0xfffffffffffffffb) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000100)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x6, 0x80, 0x80, 0xfc, 0x0, 0x800, 0x200, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2b4, 0x0, @perf_bp={&(0x7f0000000040), 0xe}, 0x3000, 0x2, 0x2, 0x2, 0x17b, 0xcccc, 0x6, 0x0, 0x400, 0x0, 0x80000001}, 0x0, 0xe, 0xffffffffffffffff, 0xb) ioctl$BTRFS_IOC_FS_INFO(0xffffffffffffffff, 0x8400941f, &(0x7f00000003c0)) r3 = getpid() r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x8000, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x2, 0x1a, 0x78, 0x9, 0x0, 0x0, 0x80080, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xb88d, 0x8000}, 0x0, 0xffffffffffffffff, 0x7, 0x6, 0x2, 0xfffffff9, 0x538, 0x0, 0x6, 0x0, 0xd2}, r3, 0xe, r4, 0x1) 13:43:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:43:39 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) [ 1612.853741] loop2: detected capacity change from 0 to 6 [ 1612.879048] EXT4-fs (loop2): invalid inodes per group: 0 [ 1612.879048] 13:43:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:43:39 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000100)=0x7) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000140)={'erspan0\x00', {0x2, 0x0, @broadcast}}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000040)={0x43, 0x9, 0x1, {0xec7, 0x4c9, 0x2, 0xffffffffffffffe4, 0x2, 0x0, 0x1, 0x8001, 0x5}}, 0x43) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b45, &(0x7f0000000000)={0x1000}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180), 0x6e, &(0x7f0000000540)=[{&(0x7f0000000200)=""/107, 0x6b}, {&(0x7f0000000280)=""/151, 0x97}, {&(0x7f00000003c0)=""/168, 0xa8}, {&(0x7f00000005c0)=""/5, 0x5}, {&(0x7f00000004c0)=""/123, 0x7b}], 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="0000e7834b5142dd0000000001000000010000000000", @ANYBLOB="2543e115b1e49f506077613633e525f400bb60bd601507f07c72079a52f8daf880df9ea2f69976c26c765917b51fd72db62cc1feb1edb61bb94da81635b4c267f2d4bf1177f01f3805e2fd3d171dab0d462c6eb7fcbee9976ab1a66b404b5fd8be6411d0082e86", @ANYRES32, @ANYRES32=r1, @ANYBLOB="c0ee99b2ff940243eee2756e34fc994892a1fb3c9e8ab6083ac22b7538fbf1445d24a3525c8ced4ac8f5a6bef0629ceda344eee9da485f367e8eb9bf409933e826995e8cc92aeb9d54e89467a298730a6509c1fcabd954bec8bad88256f2ebe2d165cf8d66548fb7442481966a386e6f4830e839fcffe9ba200666b721afab06c6b7047ed9a3563e62ce1ed635d6684d03de91ebab96", @ANYBLOB="8a147c64ad7fa9b35d187eb93414753c633ccba6bc155290f2b73858ed6506ee99adddd8c37abb9274e623dd50d04ea5c2080f79d7e8d02a493b00c6b1b28c5c79cfb7a889542ec07a62ab47578ca4f2d2694ca3a1f54b60ec63e53d7ad09689b5ca95af096e3d499bf7305561f68b45c95cdda13fb9cc91648062522c96df87088abd05dd", @ANYBLOB="46f14675339d3212abb94add303acb443137850769364dbc0cfec960fa11e579edc146ebbf97196e51ff756c785a047e", @ANYBLOB="42317b9aafa46c7038082eaab6060f9915522a5211bee478a29eb6fa40ae7c2ac8c8eaf0a066b37bdba1765410449364160e684f5765877b7116b28f99d3579cf9d5a9b4b0e620423b552d9f11a5a98c9b47c8f1cf02048556536145958603cb83fb24af199f7e31471c9f7d4d2e393adcf2c65a0c18dd0c300c06d70f00f649f06b7c4216f84790502e5212467a14ffae4675993ad9fd834da2a3c02068678fe065757d41c497af29b518e66a99f245e27a92ee4296fbf70466052d27e006a9d7c1a142ea1d87c1ef7148e8"], 0x18}, 0x20) r2 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000000c0)={0x20, 0x6, 0x3af, 0x6, 0x4, "1b8bea4592dece59"}) [ 1612.915649] loop2: detected capacity change from 0 to 6 [ 1612.927506] EXT4-fs (loop2): invalid inodes per group: 0 [ 1612.927506] [ 1615.444566] Bluetooth: hci1: command 0x0405 tx timeout 13:43:51 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x4, 0x9, 0x8}) 13:43:51 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$FIONCLEX(r1, 0x5450) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) bind$bt_l2cap(r2, &(0x7f00000000c0)={0x1f, 0x7, @any, 0x5, 0x1}, 0xe) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000200)={0x2, {{0xa, 0x4e21, 0x10000, @private0={0xfc, 0x0, '\x00', 0x1}, 0x2}}, 0x0, 0x2, [{{0xa, 0x4e23, 0xaedf, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xd5}}, {{0xa, 0x4e21, 0x7, @ipv4={'\x00', '\xff\xff', @empty}}}]}, 0x190) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r1, 0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) read(r3, &(0x7f0000000100)=""/139, 0x8b) 13:43:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) r1 = syz_open_dev$sg(&(0x7f0000000040), 0xd4a9, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f00000000c0)={0xffffffff, 0xffffff36, 0xffff, 0x4, 0x8}) sendfile(r1, r0, &(0x7f0000000080)=0x80000001, 0x2) 13:43:51 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:43:51 executing program 3: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x408200) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x4c684bb11993313, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffff7fff, r1, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000400)=""/103, 0x67) r3 = eventfd2(0x0, 0x0) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r4, 0x1, &(0x7f00000007c0)=[&(0x7f0000000180)={0x0, 0x0, 0x2, 0x5, 0x0, r3, 0x0}]) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/102, 0x66) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r7, &(0x7f0000000040)=""/102, 0x66) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r8, &(0x7f0000000040)=""/102, 0x66) io_submit(r4, 0x3, &(0x7f00000003c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x800, r5, &(0x7f0000000140)="cc8b88a0880120bb8179e09a71d8a2f873ca944a365782c1c2b09ad9d811555e7acef00e06d53c4d26569d7f76971270fffde58e236cca735c0e617126030d9a2bb15fc4c502f75ee66ebb7e3da6fdd4de3815542391f55c28ba217257c4d8f10634242b9cf356ba7bd34fdb36a48e48353f93bcfae7478d73bd40cc3bf95f384f9cc0d1ddf619638454acc1dab5a0f592905b4b49ffea9e13db9b7abbfc08eead94", 0xa2, 0x7ff, 0x0, 0x2, r1}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x5, r6, &(0x7f0000000240)="935f4edcb2", 0x5, 0x100, 0x0, 0x3, r7}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x6, r1, &(0x7f00000002c0)="620c05810f2cf59c10e34b26aacc37fab701128b34490a35bb56cc9e426f338388542774a605", 0x26, 0x8, 0x0, 0x222d0c021bfa4f7d, r8}]) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000040)) 13:43:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:43:51 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x8000}) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) syz_open_dev$tty1(0xc, 0x4, 0x4) close_range(r1, r0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040), 0x10001, 0x3) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000080)={0x1, 0x400, 0x5}) 13:43:51 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) [ 1624.469150] loop2: detected capacity change from 0 to 7 [ 1624.489586] EXT4-fs (loop2): invalid inodes per group: 0 [ 1624.489586] [ 1624.515285] loop2: detected capacity change from 0 to 7 [ 1624.535565] EXT4-fs (loop2): invalid inodes per group: 0 [ 1624.535565] 13:43:51 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x7f, 0x6, 0x4, 0x7, 0xf}}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000580)={0x1, 0x1, 0x1b, 0x12, 0x90, &(0x7f0000000180)}) read(r0, &(0x7f00000005c0), 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0xda0, 0x800080}) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f00000009c0)={0x1, 0x0, 0xd, 0x1f, 0x65, &(0x7f00000005c0)}) close(r0) 13:43:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSCTTY(r0, 0x540e, 0x60000) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x2, 0x4000) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f00000000c0)={0x800, 0x80000000, 0x3, 0x9, 0x2, "0c6e75baa4d03a0fb0ff6d326539d6521351ea", 0x9f, 0x6}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x9, 0x1, 0xd2, &(0x7f00000003c0)}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:43:51 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:43:51 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:43:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf8b, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:43:51 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100)={'fscrypt:', @auto=[0x38, 0x33, 0x32, 0x33, 0x34, 0x35, 0x62, 0x64, 0x35, 0x36, 0x32, 0x1, 0x64, 0x66, 0x62, 0x2]}, &(0x7f0000000140)={0x0, "5a307147b9fbc833b94b8f66a3f6c97586c6b792b486f96741cc8c068ed04c12182910cbe552355cdd1150fc5298db1682e01eb3b23857183e4b79c2f9b76307", 0x3}, 0x48, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)="ec", 0x1, r3) keyctl$revoke(0xf, r4) r5 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, r1) r6 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)="ec", 0x1, r6) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r6, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r2, 0x4b52, &(0x7f0000000000)={0x1000}) 13:43:51 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000008c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) flock(r2, 0x4) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000980)={"218ec4b064816218f683ad4e0eefce83", 0x0, 0x0, {0x9, 0x3}, {0x34f, 0x81}, 0x3f, [0x899a, 0x8, 0x7fffffff, 0x6, 0x1, 0x6, 0x4, 0x100000001, 0x6, 0x0, 0x2, 0x4, 0x4, 0xedf, 0xd8, 0xc800000000000000]}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000740)=[{&(0x7f00000000c0)=""/104, 0x68}, {&(0x7f0000000140)=""/206, 0xce}, {&(0x7f0000000240)=""/237, 0xed}, {&(0x7f00000003c0)=""/46, 0x2e}, {&(0x7f0000000400)=""/66, 0x42}, {&(0x7f0000000480)=""/244, 0xf4}, {&(0x7f0000000580)=""/178, 0xb2}, {&(0x7f0000000640)=""/244, 0xf4}], 0x8, &(0x7f00000007c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x40}, 0x10000) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000880)=0x81) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000900)=ANY=[@ANYBLOB="7f2db9dd7ad9f6c3b4c0c3f86052be7865ebd4f86d87936b082868e88a5e7b6388a62328c45f94655156f0633b22c9db4617f7bd9d2a5e29a995fe89947c9d474acdfb73e73aa0e4b6049da5de885328143c9c345b8075000000000000000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=r3, @ANYBLOB='./file0\x00']) 13:43:51 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:43:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 1624.732042] loop2: detected capacity change from 0 to 7 [ 1624.740949] EXT4-fs (loop2): invalid inodes per group: 0 [ 1624.740949] [ 1624.864248] loop2: detected capacity change from 0 to 8 [ 1624.868260] EXT4-fs (loop2): invalid inodes per group: 0 [ 1624.868260] [ 1624.873648] loop2: detected capacity change from 0 to 8 [ 1624.876907] EXT4-fs (loop2): invalid inodes per group: 0 [ 1624.876907] 13:43:52 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:43:52 executing program 3: sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x6fde3dd91509ab56}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @void}}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008094}, 0x20004810) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x184, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}]}, @TIPC_NLA_BEARER={0xe4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xf81}}, {0x14, 0x2, @in={0x2, 0x4e21, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @private=0xa010101}}, {0x14, 0x2, @in={0x2, 0x4e23, @private=0xa010100}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}]}, @TIPC_NLA_LINK={0x40, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x41}, 0x100) read(r1, &(0x7f0000000040)=""/102, 0x66) sendmsg$NL80211_CMD_GET_SURVEY(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x0, 0xc201de0627543b6, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x8, 0x5a}}}}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x8000) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x80800) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f00000005c0), r1) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x3c, r3, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000080}, 0x8044) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:43:52 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffc, 0x2, @perf_config_ext={0x9, 0x6}, 0x8, 0x0, 0x2}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="fc67000000000000262f660700653000"]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)={0x81, 0x3, 0xff, 0x0, 0x8a, 0x9}, 0xc) connect$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r3, 0x1) connect$bt_l2cap(r3, &(0x7f00000000c0)={0x1f, 0x4, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x75}, 0xe) 13:43:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:43:52 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = eventfd2(0x0, 0x80000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xee00, 0xee01}}, './file0\x00'}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:43:52 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x8, 0xf7, 0x4, 0x61, 0x0, 0x7, 0x14088, 0xf, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0x80, 0xff}, 0xd, 0xffffffff, 0x3f3, 0x4, 0x4, 0xfffffff9, 0x9d, 0x0, 0x5, 0x0, 0x1000}, r1, 0x3, 0xffffffffffffffff, 0xb) 13:43:52 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) [ 1625.418337] loop2: detected capacity change from 0 to 8 [ 1625.427058] EXT4-fs (loop2): invalid inodes per group: 0 [ 1625.427058] 13:44:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:44:03 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:44:03 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:44:03 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:44:03 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x200, @fixed}, 0xe) r2 = signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f00000000c0)=0x1f, 0x4) shutdown(r1, 0x1) 13:44:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:44:03 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendfile(r0, r1, &(0x7f0000000100)=0x1, 0x5) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@empty, 0x5e}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r4}, 0x14) r5 = socket$packet(0x11, 0x3, 0x300) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f0000000080)) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r5, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r8}, 0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000c40)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="9c050000", @ANYRES16=0x0, @ANYBLOB="000426bd7000ffdbdf250200000008000100", @ANYRES32=0x0, @ANYRESOCT=r7, @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="b000028038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000300000038000100240001006c625f73746174735f726566726573685f696e7465727661fb890ef0d3799f72d32339786c00000000000000050003000300000008000400060000003c000100240001007e9d8afb656e61620500640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="b40002803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000100000008000100", @ANYRES32=0x0, @ANYBLOB="f401028040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000080000008000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004004000000008000600", @ANYRES32=0x0, @ANYBLOB="44000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000014000400040008ff690f00001f00001f010000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000100000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="8801028038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004000100000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b000000140004000800fa034000000001000b40090000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000700000008000600", @ANYRES32=r8, @ANYBLOB="54000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b000000240004000200077fdd9a000000000307050000000800ff0000000000000008020180000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400d3790000"], 0x59c}, 0x1, 0x0, 0x0, 0xd0}, 0x4008004) r9 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r2, 0x4b3a, &(0x7f0000000000)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x3, 0x6, 0x3, 0x7, 0x0, 0x16ca9391, 0x82012, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x20d8, 0x2, @perf_config_ext={0x80000000, 0xfff}, 0x10000, 0x1, 0x7, 0x0, 0x40400, 0x5, 0x7, 0x0, 0xed46, 0x0, 0xeb4b}, 0x0, 0x5, r9, 0x0) 13:44:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000100)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 1636.294320] loop2: detected capacity change from 0 to 16 13:44:03 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:44:03 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x1, 0x2, 0x3d, 0x3f, 0x0, 0x6, 0x1, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1f, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0xc05, 0xff, 0x9, 0x0, 0x6, 0x7, 0x5, 0x0, 0x6a, 0x0, 0xfffffffffffffff9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) [ 1636.353623] EXT4-fs (loop2): invalid inodes per group: 0 [ 1636.353623] [ 1636.381407] loop2: detected capacity change from 0 to 16 [ 1636.423203] EXT4-fs (loop2): invalid inodes per group: 0 [ 1636.423203] 13:44:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f00000035c0)={0x90004002}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="ce04ff91899d5d8aa029f4155b1c", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r4}, 0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000b40)={'syztnl0\x00', &(0x7f0000000ac0)={'syztnl1\x00', 0x0, 0x29, 0xa4, 0x5, 0x6, 0x25, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @local, 0x40, 0x700, 0x5101, 0x3}}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003500)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x200, @private2={0xfc, 0x2, '\x00', 0x1}, 0x3}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000080)="4f729cd9", 0x4}, {&(0x7f00000000c0)="60c2153d679a7d66cc6c7da45f45dc68", 0x10}, {&(0x7f0000000100)="5bac7a9f2fc71c7d09e57d5eac61a2bdad05f5d9031ae8d9eaf2e4c0f1d403d08b9067bda6015f8aac81", 0x2a}, {&(0x7f0000000140)="0f42a8365f35161d0e7b983424907094d6710f2bf8b1f798de0b85e91ce1c06ea81d3c58518278ecc1842a27bf08e966d10078f02cfd6dfeea7f5686b4682c1a69236a0ebfcd6eb1dd2ede909e7041dfde3067014b696bcb5e1ac7ec1c4ed8b855f4070124ac546fafcee4a49b3a794f8adf69d9bb520736d9751152dfd43b02daad303a5a595db09d342b0fc7954476b961298dd5436ba32471c099ad8a7df99cfacc5460fff1f5fe464cfcb948ba246fb6c1dc020ee7a7e2f4f29455", 0xbd}, {&(0x7f0000000200)="062d4dd31b9d88c1da0a", 0xa}, {&(0x7f0000000240)="663fc8504364619ffa0d44e286000d351c07eb4e34922d2953bd4eb00096a3f381ec055b720e855b646880ee2a2eb368cdff39f1103669f8826e0eb0962a2db4b40e7b303535ecee9106afd85e952e4da7ae3612af8704060fa26a4b90006383fa7ea8ed918bffed1351a9b84879cdbe15ce56ee13c83c335fa2d448570f57acd852618a", 0x84}, {&(0x7f0000000300)="b5033c1c189f714001897c622d1e8b56d0412d52c9d88d9427d2e6e30f9a4c739f61bb82db4fa9b367c8d2f368712d90e205aff99fe039658ea35d0521d9d59564e7037915270dab1560a94cac02797ee64eecf1ab3fdfa9195276ea41226ade0e30e83ed23317bddb440f618e09", 0x6e}], 0x7, &(0x7f0000000400)=[@rthdr_2292={{0x18, 0x29, 0x39, {0x11, 0x0, 0x1, 0x3f}}}, @pktinfo={{0x24, 0x29, 0x32, {@remote}}}, @rthdr={{0x58, 0x29, 0x39, {0x62, 0x8, 0x2, 0x1f, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, @ipv4={'\x00', '\xff\xff', @multicast1}, @loopback]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x7}}, @dontfrag={{0x14, 0x29, 0x3e, 0x2008000}}, @dstopts={{0x70, 0x29, 0x37, {0x2, 0xb, '\x00', [@jumbo={0xc2, 0x4, 0x200}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x1}, @calipso={0x7, 0x40, {0x0, 0xe, 0x5, 0x3, [0xffffffff, 0x1, 0x7, 0x1, 0x0, 0xfffffffffffffffa, 0x4]}}]}}}], 0x138}}, {{&(0x7f0000000540)={0xa, 0x4e23, 0x80000001, @remote, 0x5}, 0x1c, &(0x7f0000000a40)=[{&(0x7f0000000580)="95d1721e53d43d4a8308c7d90b5e4fc2a975e8408f014bf39df6184d7d06067669bb502fa4f4e162598d4f049a79f666eecdbbbec6288ce89462d399e0a7f4b7ac1c5640877c1303c5e8511a4a0c722cfcf7f10accdf49248e8a63a0970cb6d7b2f855939a41f8e3e56fdefcfc606ef0b3ae24f0280a427ff606920c7668b836267b5825309a3e0e59f1ff7d632d20578be559937bc241026372024782bb7251c73c41ba429c3f01740e82ef97f5475987b473500a9ef1f362e1457bd27d286fb76a7a4d15b2a3a7129793b0d9581c6438107a", 0xd3}, {&(0x7f0000000680)="bd6a34873cf5ef6a1c6b8d67cee7025259309af55c470596bf459b39b1b8f8b28f2997da13ffb6395e00b845b9dac697d91e72d9aa7bf9a92ddf213d7fa830035b415193ab32259c5fb345a4f4902e208d4ae1b147c106c580d3357f89a71eb7bc1e96b830244df1884d13", 0x6b}, {&(0x7f0000000700)="481410fa9d979fefb27f1935b93699b96da6086ad40615a3e323990754", 0x1d}, {&(0x7f0000000740)="19672bbdc3f045e57be6b66a3e7bca48fc0b6e88c6eb1fd79cdc99d37e570c291201dfd8e4de0a0c219d75644b8724a4d13313bcf4a7def029a20cc970de5b44d59e2c1f11945b401ab5d3302d0c4ca3484cc65cd73a316e4b34ca21427502d0614f3a9f28bebb7909f9dc0d8465e1b2629635513aedd64f1097377740d2f0428a0c6e307a870cb11b447810f3233ab36527c459cce1a95e9bcac72f87e03d225d18f9d4e551d2865dd96c623c3d0928180b0a76a5ded17c9750ac21524b4db6d36c0e90c0f8d215b8ed354594274bd4dbd95f1e3f", 0xd5}, {&(0x7f0000000840)="5298f7ec85b4862c00dd5615c287bed35821f41af8715c82c07b98599e69b8ea886353af062b54ec8daaf18c729ce0210233e5437d3c0e6dd7655bc9b4db3dc3ec815d20258fab6f3dde6dc71616efb950934388a13a16d3519eea743ab777eab416552180a2c7ac21e537d8a545c129fc9cce09c162e828231ec2bbaa7434f24dd18c862882a0e6e4402faccbb5372dceb9247ecf67662adaa4cf31a5bacb31e1c22f0388dc8a124da1a48e433a6b397c31ef", 0xb3}, {&(0x7f0000000900)="666c05cc0fd2a37cce8e6c8e96404c35dd7d50a42839674fd14054e2234ee3fa3147c04f0b5bb52acda503864923ccb68a1fdabcb21d0e398faad5b4b4e532cd61ab2291d64218fdedc180d559c2ac620e4d27340af9139cefcd4a11dd9225366c7edf9006edf0d687740db721ac5fb14c23199a9a0a3248e4b294b54275ec85d385efe9ec421f1ece05bd61e62ae771cc3d8e65b03c7bfc9d", 0x99}, {&(0x7f00000009c0)="55929faf36c926fafc0380463a3caad9e0564fc1575ee76299870bdaa72a6acd4b0e57195b355229500bdfbbe9a54c95a322d79f3802904fdc86abef5aafd9033bcb02f3cb9df152c8f697eb8dd309688da3d6dc90782cb97cb30fafc6eccf56267b8bad815c45605e9936212a", 0x6d}], 0x7, &(0x7f0000000b80)=[@dontfrag={{0x14, 0x29, 0x3e, 0x8001}}, @dontfrag={{0x14, 0x29, 0x3e, 0x100}}, @hopopts_2292={{0x140, 0x29, 0x36, {0x62, 0x24, '\x00', [@calipso={0x7, 0x28, {0x0, 0x8, 0x6, 0xffff, [0x7ec59696, 0x7, 0xffff, 0xfff]}}, @generic={0xc1, 0xeb, "b891c151c924ae0805f9e54ce6e7167474ec8ed6dbbcfb8b97114165736358ca96d864eb3ec35ce54d79195eea69d9642f24103fe903c47c0240d795c0393ca7f1fd79ad3af13387f3f3a67a513346a816ed83f0e542afefdc8059da4625db37a67c0fbf8a3f1a935d9ff4d9c8ab4318da80bb37f0c4c42f8dbe7c5139ac06e8e044b6c3a7bfdcecd831d9205fe60c1068eb199062e9b347313724605aad62097b5f1ade0c86a4de664cf02edeecafe217162db76b879a7a032578a71d5259a3427c3903dff74a2630ab92bbc389e1005aceed96959bf10ab9d1c6e846ed7fbc66f9c3ccb5aac68bd6989d"}, @ra={0x5, 0x2, 0xaed}, @jumbo={0xc2, 0x4, 0x3f}, @jumbo={0xc2, 0x4, 0xfff}]}}}, @rthdr={{0x58, 0x29, 0x39, {0x29, 0x8, 0x2, 0x6, 0x0, [@local, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast2, @private2]}}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}, @hopopts_2292={{0x80, 0x29, 0x36, {0xff, 0xc, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x1}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x1}, @calipso={0x7, 0x38, {0x1, 0xc, 0x3, 0x1, [0x80000001, 0x67f, 0x5, 0x1000, 0x9, 0x276]}}, @pad1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x2}}, @rthdr={{0x38, 0x29, 0x39, {0x16, 0x4, 0x2, 0x3, 0x0, [@dev={0xfe, 0x80, '\x00', 0x3b}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01']}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1, r5}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1000}}], 0x300}}, {{&(0x7f0000000e80)={0xa, 0x4e23, 0x60000000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7fff}, 0x1c, &(0x7f0000003340)=[{&(0x7f0000000ec0)="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", 0x1000}, {&(0x7f0000001ec0)="9455be024e1dad8c868e5f5d59c928af4c7aff3965166afdaa4e9d7b5a1ed0fdceb68ddf89944f7910585bb4dfa2fb814df43128136cf043c4b8b0d7ad012d4a5806818215d7ecefa331109a0708f1adc52caac121ddb6df8f15135a89e68a9591cc353bb618d966f3c2572d6f6e9ee21cc7013538386e67d81e2033e09ce246b32ed45f82", 0x85}, {&(0x7f0000001f80)="9677daf1bd777584199703f7cba0d90b4cd35517c167cbb32cfdd11297da7dc5984ccb6197b49340459c86ca3892016f433202728a34d3cf7469c92422dc685a", 0x40}, {&(0x7f0000001fc0)="2799d4e5d2ee9403ff2f963b7b727d0213ea5e8c2f7b354dafb74c18c698f80e67dd3784c37a754cf7e38bfa1ea881a5286e88fee56104c4e3a80dca326bdf990bfff2c676265b79a19aa98962a74a3db1640492a417446cb1dd444eda44bc4f933e799e59dcb28821a9a5c40557bdd6e4d94b02d20c2a67c2fcfbef69ebaf3c5bf68432810f2418120d1511675ea00553d95b3c39d151858a2d7a476bb58c29243bf651ed0a44f14b5b54303da65b86129ea0e55f1812ed3d008b8e29033693beb01572a54c7ea8c73d5e782979", 0xce}, {&(0x7f00000020c0)="d6796042ec67c0f44935f2841c53a71d74b67f02cbc02b9c9976077c3ddcdb696ffee2b7663756b875bdd1174eb5274cc10caad2f9abc2daf8ac5ff5fe9d5d41239384bf0ee271e213cbf48b235407b9583ca55a1747ce1a93f613b3f3c214f28f8341dfa23bd4f6fb74d3", 0x6b}, {&(0x7f0000002140)="ef92d7efcdec144f65a9c01edea3304e7af3fb3afe392979da8d056cf33951261292bef08340ac434f92dda13d0d121b7963cdceab162db92246cc2bd36569bb1a3883aef54991726e6f201b2036a4a6d34194370ac6d6cd266630baa298f6befe5e1c020b88b4d18aeaa197", 0x6c}, {&(0x7f00000021c0)="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", 0x1000}, {&(0x7f00000031c0)="986421acae135d802935998dc5c32910b450c18823e4b70988ec78cf76ab8b05bb55ad4e", 0x24}, {&(0x7f0000003200)="ff860d9d6f6c8436", 0x8}, {&(0x7f0000003240)="0444ebac61dd58f68420be852490117f2108a0b2f4914d82d98a1eba845d203daf1a35a4c9ff0c4dfa62a48854b457d3aff84c40214bec56e33e4ef0b3a191a33b4d9fd05801c0b2b965a9863a26b93b590233f52fb7dc5a35933e8feb64275ec0ae54d2a161253c1ba09581f65af852e1494dcd30c623d045884bb576860f52d121b2b7c3ded41ebd119a8c0df094f9a1027bb4157d1270e6e59efaabe59fbce062c5f8ab0a4b0eff58327b2e340fe447d472a6bedd15e93a022860fc9ad7aef7302c0bb402cca727b9c324487bf0c2c13bff79b736290b0f2cf689e20ca8123e83720cefe5c1b7f067", 0xea}], 0xa, &(0x7f0000003400)=[@dstopts_2292={{0x48, 0x29, 0x4, {0x2b, 0x5, '\x00', [@enc_lim={0x4, 0x1, 0x8}, @pad1, @jumbo={0xc2, 0x4, 0x8}, @calipso={0x7, 0x10, {0x0, 0x2, 0x8, 0xfff, [0x9]}}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1]}}}, @dstopts_2292={{0x38, 0x29, 0x4, {0x2b, 0x3, '\x00', [@padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @loopback}, @ra={0x5, 0x2, 0x200}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}, @dontfrag={{0x14, 0x29, 0x3e, 0x1}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x2e, 0x2, '\x00', [@calipso={0x7, 0x10, {0x3, 0x2, 0x0, 0xfffe, [0xffff]}}]}}}], 0xe0}}], 0x3, 0x44) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r6, 0x4b46, &(0x7f0000000000)) 13:44:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:44:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:44:13 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) recvmmsg(r0, &(0x7f0000000300)=[{{&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @private2}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/178, 0xb2}, {&(0x7f0000000180)=""/225, 0xe1}, {&(0x7f0000000280)=""/49, 0x31}, {&(0x7f00000003c0)=""/156, 0x9c}, {&(0x7f0000000480)=""/150, 0x96}, {&(0x7f00000002c0)=""/47, 0x2f}, {&(0x7f0000000540)=""/74, 0x4a}, {&(0x7f00000005c0)=""/226, 0xe2}], 0x8}, 0x101}], 0x1, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b3a, &(0x7f0000000000)) 13:44:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0xfffffffd}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000100)={0x3, 0x7}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCL_BLANKSCREEN(r2, 0x541c, &(0x7f0000000040)) 13:44:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:44:13 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:44:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x1000, 0x401, 0x400, 0x2, 0x10}}) 13:44:13 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x84000, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000100)={0x4, 0x81, 0x3f}) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x13, 0x15, 0x1a3, &(0x7f00000003c0)}) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:44:13 executing program 4: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000000c0)={0x9, 0x9, 0xfc49, 0xf1d7, 0x0, 0x7}) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r1, 0x8008f512, &(0x7f0000000200)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0xe) shutdown(r2, 0x1) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x81, 0x9, 0x4f, 0x0, 0x0, 0x1f, 0xc0, 0xc, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x40}, 0x204, 0xa000, 0x7, 0x6, 0x3, 0x31, 0x1f, 0x0, 0x6, 0x0, 0x9}, r3, 0x7, r0, 0x8) [ 1646.288013] loop2: detected capacity change from 0 to 16 13:44:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) pwrite64(r0, &(0x7f0000000040)="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", 0xfe, 0x9) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) 13:44:13 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x4) 13:44:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:44:13 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x10401, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x22, 0x1, 0x7f, 0x0, 0x1f, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef7b, 0x2, @perf_config_ext={0x6, 0x64d93d0e}, 0x6624, 0x1, 0x101, 0x3, 0xb888, 0x2, 0x1f0, 0x0, 0x4, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b52, &(0x7f0000000000)={0x1000}) 13:44:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:44:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='uid_map\x00') r1 = syz_open_dev$mouse(&(0x7f0000000640), 0x3, 0xfe21680a51171f83) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x80000020) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x6) read(r2, &(0x7f0000000040)=""/102, 0x66) pidfd_getfd(r2, r0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r3, 0x4b46, &(0x7f0000000000)) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000000c0)=0xfffffffd) r4 = syz_open_dev$evdev(&(0x7f0000000540), 0xd973, 0x84000) ioctl$F2FS_IOC_GARBAGE_COLLECT(r4, 0x4004f506, &(0x7f0000000580)) rename(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) syz_open_pts(r3, 0x40204) read(r5, &(0x7f0000000040)=""/102, 0x66) ioctl$KDFONTOP_SET_DEF(r5, 0x4b72, &(0x7f0000000500)={0x2, 0x1, 0x19, 0x19, 0x10d, &(0x7f0000000100)="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"}) 13:44:13 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x4) 13:44:13 executing program 3: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000140)=[@enter_looper, @register_looper], 0x0, 0x0, &(0x7f0000000180)}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r2, 0x40189429, &(0x7f0000000180)={0x1, 0x80000001, 0x4}) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000040)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x40000000000000}, 0x0, 0x0, 0x0, 0x0, 0x101, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000100)={0x0, 0x800, 0x2, 0x1, 0x13, "e0a9b400f09840f1"}) [ 1646.319611] EXT4-fs (loop2): invalid inodes per group: 0 [ 1646.319611] [ 1646.338979] loop2: detected capacity change from 0 to 16 [ 1646.350050] EXT4-fs (loop2): invalid inodes per group: 0 [ 1646.350050] [ 1646.513323] loop2: detected capacity change from 0 to 18 [ 1646.526824] EXT4-fs (loop2): invalid inodes per group: 0 [ 1646.526824] 13:44:13 executing program 5: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x280000, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x24, @short={0x2, 0x3, 0xffff}}, 0x14, &(0x7f0000000100)={&(0x7f00000000c0)="0b22b4e0fab030f4fb5a87cfca581dfb3d7dccbe219633731078595341216e4be14a50564656ba8800eb7a1eef68ec19d4affa5efff4", 0x36}, 0x1, 0x0, 0x0, 0x8000}, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r1, 0x4b46, &(0x7f0000000000)) 13:44:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:44:13 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x4) 13:44:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r2 = signalfd(r1, &(0x7f0000000040)={[0x9001]}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='-*+\x00') 13:44:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:44:13 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000040)={0x8}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b3a, &(0x7f0000000000)) [ 1646.853679] loop2: detected capacity change from 0 to 19 [ 1646.866611] EXT4-fs (loop2): invalid inodes per group: 0 [ 1646.866611] [ 1646.877157] loop2: detected capacity change from 0 to 19 [ 1646.885504] EXT4-fs (loop2): invalid inodes per group: 0 [ 1646.885504] 13:44:14 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$TIOCSBRK(r2, 0x5427) 13:44:25 executing program 6: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000180)=0x8, 0x4) 13:44:25 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000840)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000080)={0x1, 0x1, 0x19, 0x11, 0x53, &(0x7f00000003c0)}) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f00000000c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$KDGETKEYCODE(r1, 0x4b52, &(0x7f0000000000)={0x1000}) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x9, 0x20, 0x5, 0x7, 0x0, 0x8, 0x20000, 0x9948308e11656b17, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x10010, 0x9, 0x1, 0x9, 0x1, 0x5, 0x8, 0x0, 0xffffff72, 0x0, 0xc5}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f00000008c0)) 13:44:25 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b46, &(0x7f0000000000)) 13:44:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:44:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3704, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:44:25 executing program 1: r0 = getpid() pidfd_open(r0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) pidfd_open(r0, 0x0) r2 = eventfd2(0x401, 0xc00) fallocate(r2, 0x1, 0x371, 0x3) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$KDGETKEYCODE(r1, 0x4b3a, &(0x7f0000000000)) 13:44:25 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x90, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x20000000}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000040)) 13:44:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x34, r1, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x9a8}], @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x962}]]}, 0x34}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x34, r4, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r5}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x9a8}], @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x962}]]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9b58, 0x69}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x8c0}, 0x8004) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r6, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r6, 0x1) 13:44:25 executing program 5: ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)) [ 1658.644691] loop2: detected capacity change from 0 to 27 [ 1658.671979] EXT4-fs (loop2): invalid inodes per group: 0 [ 1658.671979] [ 1658.681287] loop2: detected capacity change from 0 to 27 [ 1658.685399] EXT4-fs (loop2): invalid inodes per group: 0 [ 1658.685399] 13:44:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6gretap0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvlan1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_open_dev$tty1(0xc, 0x4, 0x1) 13:44:35 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000180)=0x8, 0x4) 13:44:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:44:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:44:35 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = getpid() pidfd_open(r1, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, r1, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000080)={0x3, 0x1, 0x44d, 0x0, 0xfffe}) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000000c0)) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000040)={0x3, 0x1, 0x1c, 0x20, 0x1b0, &(0x7f00000003c0)}) 13:44:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) syz_open_dev$tty20(0xc, 0x4, 0x0) 13:44:35 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:44:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x400, @any, 0x82f, 0x2}, 0xe) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) [ 1668.935350] loop2: detected capacity change from 0 to 31 13:44:35 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000180)=0x8, 0x4) 13:44:35 executing program 3: accept(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f00000000c0)=0x80) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x0, 0x13, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) [ 1668.973368] EXT4-fs (loop2): invalid inodes per group: 0 [ 1668.973368] 13:44:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x28900, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$VT_RELDISP(r2, 0x5605) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:44:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) [ 1668.993991] loop2: detected capacity change from 0 to 31 [ 1669.027383] EXT4-fs (loop2): invalid inodes per group: 0 [ 1669.027383] 13:44:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000440)={0x1, 0x1, 0x1d, 0x5, 0x3d, &(0x7f0000000040)}) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) 13:44:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:44:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0xf, 0x7, 0x49, &(0x7f00000003c0)}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003200)=[{{&(0x7f0000000180), 0x6e, &(0x7f0000000300)=[{&(0x7f0000000200)=""/209, 0xd1}, {&(0x7f00000007c0)=""/132, 0x84}], 0x2, &(0x7f0000000880)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f00000008c0)=@abs, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/170, 0xaa}, {&(0x7f0000000a00)=""/125, 0x7d}], 0x2, &(0x7f0000000ac0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}}, {{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000b80)=""/16, 0x10}], 0x1, &(0x7f0000000c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x68}}, {{&(0x7f0000000c80), 0x6e, &(0x7f0000003100)=[{&(0x7f0000000d00)=""/3, 0x3}, {&(0x7f0000000d40)=""/245, 0xf5}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/113, 0x71}, {&(0x7f0000001ec0)=""/141, 0x8d}, {&(0x7f0000001f80)=""/143, 0x8f}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/88, 0x58}, {&(0x7f00000030c0)=""/35, 0x23}], 0x9, &(0x7f00000031c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x4, 0x60, &(0x7f0000003300)={0x77359400}) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x9, 0x5, 0xda, 0x3, 0x0, 0x5, 0x620, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0xce0, 0x3}, 0x400, 0x2, 0x1, 0x7, 0xffffffffffff4af8, 0x40, 0x6, 0x0, 0x3, 0x0, 0x3}, r1, 0xf, r2, 0x0) 13:44:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDADDIO(r1, 0x4b34, 0x1) 13:44:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:44:36 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000180)=0x8, 0x4) 13:44:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4000, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:44:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:44:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x9, &(0x7f0000000100)=[{0x1}, {0x2, 0x201}, {0x5, 0xfc00}, {0xffff, 0x4}, {0x5, 0x5}, {0x9cc2, 0x6}, {0x200, 0x5}, {0x1d8, 0x200}, {0x2, 0x3}]}) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {r2}}, './file0\x00'}) [ 1669.269013] loop2: detected capacity change from 0 to 33 13:44:36 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4) 13:44:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) [ 1669.277065] EXT4-fs (loop2): invalid inodes per group: 0 [ 1669.277065] [ 1669.284957] loop2: detected capacity change from 0 to 33 [ 1669.289845] EXT4-fs (loop2): invalid inodes per group: 0 [ 1669.289845] 13:44:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:44:44 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x0, 0x0, 0x1, 0x800000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [], {}, [{0x8, 0x0, r3}]}, 0x2c, 0x0) r4 = getpgid(0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002280)='/proc/bus/input/handlers\x00', 0x0, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r6, &(0x7f0000000040)=""/102, 0x66) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000022c0)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r8, &(0x7f0000000040)=""/102, 0x66) r9 = getpid() pidfd_open(r9, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r10) clone3(&(0x7f0000002500)={0x40201e00, &(0x7f0000002300)=0xffffffffffffffff, &(0x7f0000002340), &(0x7f0000002380), {0x1f}, &(0x7f00000023c0)=""/143, 0x8f, &(0x7f0000002480)=""/47, &(0x7f00000024c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x6}, 0x58) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000026c0)=[{{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000140)="6d641288d4fde07af3f4a25f8c24213112d86ebdaea13faa4d3ac63aae502208d15e260025e1411b6337247d3096e1d4888c9849a1a1b12f944481af942a78d81f9ca76292be4c09762bc42b63930841945ca41efe9fb691fb7b0859db85b2de9f", 0x61}, {&(0x7f00000001c0)="25ea00b58f7656fc6a22cf26b6cefa8e720332ad7c7097356150514dba7a77258cf7072061f202d50b0ecbcf5587bf584df3c7199f5911de90cf026533180213ca493c1659ec23229e703b613a05ed1d4c77fc7d3fc8234c3e87fb1f7a78857eb7af650ad63e3efaf991d578281ef752df00b5ab77e94091c1bc8f25b3ecfda920d321ae02b98c21c59c75f9836b5e4cdaca95237b097bce729282e31cbe04abc51bacae550d3ce15429d487538c9323246890db968f1a672087c118b98c8819e9509c012829e1649bf02d7ce4b684e62d39c7824545f72b0f98a9510b21ced97853a2b123", 0xe5}, {&(0x7f00000002c0)="7a2194f1f13dc3537073ff296d60b99f63cddf754d5133b739c87bc8eff1671501a8782598f9f48a6b7f1b05df21cc650f87a089c6d8b4605293ae29b9", 0x3d}, {&(0x7f0000000300)}, {&(0x7f00000003c0)="4136e2009bb735f73b88e4471e038d996d9fd705b95074bf37cc189f9fe3021147b3c85cd40914712dec49b681a911e57d01e879e2d11ab846bd963d7d9e65e72010a647d4029154fbc650776e5a72797b7f36404c2d968d06d4193ba97ffa833afe8a1f48d9b7db67756dd41ef50891243bd5a84455f0feae68a8b4168d1e3c264482f0fe80fca60b09f05727c48ea256f1e7e6c9d727bdf4aa3f934cc319e2ac2ed3f268f9975229521912f51ecb3c", 0xb0}, {&(0x7f0000000480)="acbf9c42760064d0290fd1578a7c7d81e0de37503e37cb0db23d4e3483025603c5985151eef21e10bf46c485fef14dbb0ee1587973c903b52c166624b14984befa1a6bad9a7e3d049efcfbf05b29165e21550103c2426e3baaa26b6be1cfddde449359033f6e674c0faab20bce2dca43f604590706bbb3d5727a2596e0b1a4a2ad82bf09c900a4434521a478379b4cfb77ece604c735b655cc9ecdf0b2a29a88cbd3", 0xa2}], 0x6, 0x0, 0x0, 0x14}}, {{&(0x7f00000005c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000640)="788260b653009ee99116ce34549890728e3169cb2a28f3f4bb516d3e778cf5f39e883db69ec901a8ade6067d4a47ea50b99906ca74e939c6ca8cd334ddebd15508523f95982b7d133b1b4555e3df3ad89294c5c0f90eee868a3165f209e09f9ca2543aa63a812ca5f9e4fe934507ef076723bcd78eea27ea00e12c84823877e0cd859db77ed6d5f732f47a9bf2e41ac70694a096ff08a52754332fe0c3342fae94a541664be43899a8a3b4e6ea697925c3ff5dd30da131b407592dadce20ec727891801c7efefb30cdd4cff5", 0xcc}, {&(0x7f0000000740)="73239dbb78ab992d1902da0fa82270a854a84402fe73005bc97f952e8130c496bea87e32e9859b238309c3463a9a34e828101693e2a608f8df02002d7c45ff86dcce8ac9137eb0d5a7fe0244ba7d0b193a8473af6ab4a40bc50e74972bd4b40a935885a94e5de69d033902e1cdcdc1b644c332148500b536675c5793a84d199551508c8d3d1fb87457ca1682bac3b7fd30e023b90096a152437688dfce9bbdf62cbade7b7e292b7fada1a0ef08839c2eb3950979adbe75b3fe12bdd5d7c416853bf9af32cb8b713ece8f851eccb505da389243225038abc7416acb3394b1ec4401051f22bfe82bc370ea", 0xea}], 0x2, &(0x7f0000000e80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0xf0}}, {{&(0x7f0000000f80)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000002100)=[{&(0x7f0000001000)="ae7f9d429dedd0e8dc85604f793f30367f677971236e5aa3aac1889f3177efc951938a57b7bfd08c34864ca92266f1ecdb7bf2baf493a17d70bf5d90f354aa1532ca1ca42878ae2d52a15d80ab", 0x4d}, {&(0x7f0000001080)="f7712019ac8eab608d947662b000dbed40f91f442c50dc5305", 0x19}, {&(0x7f00000010c0)="689f61f73f348dd2fd14ab4a8890e6d6a8af193b750840bd823a19a3f86d1fe93edafaf1d69eda430d051e305dd8816093265e", 0x33}, {&(0x7f0000001100)="ac6cc2cf58381a42a480979fb27c7ef02954a6d01dc7afce39ed434706330a010ab7b245e6dcbdb03734e30a9d7add044e9c0e0cf57e90b959d2e3247e0e0373cd3a4d4c1747ab7f5fcc2dc08a08c70b0b926aad3d43fe189b4535fe63b12bd35c0dfbc0fdf1e0c0830e87b59165410007cef6ce77c2821f7d96a77667e2ed857a559302c839e946473212eb42ffbd78c1a35bdb9c2d11844e70e930b3d71383069f33ac0add63ff3035dc94b10d359991351047ec1e969c68a9c95dd92e0dcadd79b9fc228419374b149784cac2677195449693721e86341ae3bbd63dc0b57f8c5a842f679add54f28c1cb5b98fe5317d80ae48b12247d56aa4ee71419491cf683364effe8f8db0577bc208ab8986d19a1f83053c90b0badaeae8af06983018223a320c4d105bd0b3cc5ffe5b83ce790a8edd9df77683b11fc598dd03d6d86418f9d7521f86b3cb2d9fbd16acdf3a25beac2122e5de66fe7e48da49eb9cd7392cf275d1a8e076e05442d5d17b4ea37001367b026d5cba88a33d7a930fa083d612044bd678d1ffbecbf7f9245be141c938ff4bb54066d6780a96f45577da3a592f277567161c8698e9932e3c498d74bdcc5130ff14eacb66b4d37fc7e15f8cd2db2f23e02fc8a3f6ece1e9f9935895863c00e814a0cc46a2d77c8c864e1c55f1c84c046720a6a4d3de3d4aacc3183ca73a81ee25acd7593ae4e5e0c7caec5a01d5a6f85d7603c4a4551665148a3905b1e914c20f508c240312087b9ef6ec83a515c6705f594254bcee428a49a646cdbeea204fde57d6a141a75b7b783ad08c0f368cc9f741efe4a39a5d9f93ceda75b3a725fff5837c5e342bc0c51bd6ae4ce791807b795bff210b7f16e88dc6698d008dd3c3929857aeb0ce9889dc048550ad28b37c61df2a0df2bd8648170deda5d17220114154098a5891ae1c78335e540e03854b63fdebe5364538577f5d3ee545ec9ad5b3aa153521de1e9292ee7460d0cac8122df0f5aa4e743c89102c236093a0d2fd9ba3b2e8208c935751dc81de10dccf03b04e89138dd4ea68cf850c9417952428a094322af243c76efe83d69c42476d2ef80210d6896fc07991d4ff85eb36e6ede57b0ca02c4e1e733e439804e22ba310e49469c47018aa8d46605d5d18eaac5ae27ee0776fa0a919c70a5cc659196f4fb678342a93cdc31035081f02098fe5d47a1988c54e4789cee02760a9dde70c15fe85102cb6afeec971a55d80e7071486b8090cbafcf567c5ee25f682af3bbfe011a2f427617c2d97e45fd3fe5b3b055173d862dc2cb755634beee651bdcb4a7331c707d5b7f74fc5c8576d8413ba24a7304164ea647f1f82431b34781238616c7d9321f58a63b3f00de191e5610746cb7f8aab7d4e8ceecf99b1aff97297eca8756ca270b31886b8b3321d4a160f2785431624011e24c93fdfa9c065c43e0b8c3fbd1aca13867204b78bf8936994776c43e3ce778b5def875bf160d2611a5ac61dae1e038c0e38180797d91e40e313b7b0b1da0c9ceda430db62b64f2665ee137b8922b355acea55dcdf460300db0794fc8ed16f0f79ae8bdb216220d8b088424b7ddd2d1a64ac9d591a2d1293f1a91c658baa143fbe2b8dbf5d280396ae7874dffa5ec8a83f7fb16c34f3b56dcf8a9d38e74436cebdf8a5d1b5ece335e705fc9263bc06778a57e932266399f9e3ca40f6ad263c0078bd6b9c77a4551593369e0330636f697a67ac48ada93505e6fcf305d441d1c323ed8ff592323f0d1583a8aaaa989d3ad5d406dd8656816c93a92dfd7ff7fa026235ffeb12872b4e9b5b8a832efc5a46567c489d1e8f06515f14be3654f33ba8321805f22cebc95e31a6a55d388d1cecc7e600b47f51f3723317f569cf963f8f206689f58875e9fb10e6c3053ac568e0865574b6e7f7cde54b8d8fa8adb315f71d1ae8d9b37c894a6d0900970d655bdecff2405fdaa74e57be9e6dbe571e0a7c39d8ebe1f11e103d36028eb0cf4f1a2ce94b72ee1dbb40ed42095af2bf71cd69515847bbc8fa4ccedc1f41156d12d70492ce2eaef0b7f6731abc7f161b280b4d0058381193cf418005f8c9c507dadcecef412f10f9f88c5c2a1aeea70fea5f65d14055d23f2f5971c4c60d96f9fca34ef0bad2efc8918d7a1367f7800d87c454903820f5c3d7134cb607daf50554aff25227fe5659969ae673438bcce71860d966d9bf64d296a23fb3cb915158497d9f5b2226e783114dd0a4fc263008b5dca8db977fb16479c38b5fdc8d620b404a5816d819bb12d38cf923962ada2a3be38daac5351e764dbc0cf0d7cd4dc277c79b6a21d274d146e51dc2da4ce36584f0b9ce574e31bfac0868b184bb1cdd5aaa18b452e083ba105ef350edb3408bdceb08d11a27d4a46de1a6dc5684e31573c67953a7352602cbfa27d5711cd0e7dc2150b21da94f101190a6fb5d07fcf4484370fa9eb1523ea563332a215e546f1b1a9b187c018d39fc8e3ad59ff9e905d8939ee582ac8ac5f59c28fb62fef5da2fca6146968c87dbacc6748010f95a3c13fe4eac796b47595dd0f616f6fd881b415527b0bdc375fbaeab2e1c1147bc2f5682db4113226d0d079c883ba6d06693290da18deb18b919c31f63544ca7d1c8a5f0b17de1740607e5e557348cd90d590643ac8d15c32b433e222754ae1958d685823a09f36354ad7d9f1b20af0e2140fe20fab46f14fe5f9ba517c4673885718270b8a0ce0ccd83b21f3b80a6ee8bb21deaca7e3d4769f9a30b6fda14f3ed05f4bd715e45d10fcc72532c346cfe31972a6be4943c80e8a38c166831d608293543bbf143f37c84f75f684e44691c5e1bfec57d48e57fa2704ee39935b8d22ea38a4703e78a6a1f487aead0432f92b95ad341e4f72c3e748412c379483d786c07b2345d3074447c3fd11fe131ff2615824761ffa7e48bff179addd6efe0bc0562f82e4569dfcebd6d870bd6480ab856a78fbb531b96e6629c6679614f493dca623778fd5c5fdbe14aa73e32ca4bccb5588dfa80e99ed737dd1b319c5e0f82de6209f895d48b6c1cc1de25956be07a0071375fe914c95735ea4fbc52e6b200666bbe9e7c1cda579810ad6b4914ea98403a4d2b4b4f207f7047473e7e180e08faccfd7500a397f95a3c859c2e0505ee1e29e98167379364475c897e430301b9c1a95fc6d50567b1522f88aad9437eb96eae26fc894892253c31ffc81ad30085f9b9c51679cf296839b3cf423487e9f95e0a8f93191e0e5f0f8d2920c727c713a72c214d958c2c53403f7f3a99ea640d5f482903e67bdac4548ecf781b3e38fc1a5ec5b85b9d5836c9a47ace07f74d342c207c9347c16a6d07b9fbc2e07542f4be2f3a2da0d6c720ab57398f74c34e3e18fa2d99be93e8e7b78d111cbe42c3a509c856dca6fa55e53095ae1148925c979e20b730a952970168cb6d0c41a7b29caa56f413a0fc3636653d87d8f7f8b7199490785f2b673493715b2f10bf96bbbb60e62bfea92dc32687552c9e730bf11c62000faa031667c33d995eadf1dd1e5ec5a3ab248b5a9ae811c5fba49ff21222fac0c9597a45196510edd4a06e417b032bf01edf9c58545fa8ef503b49c0c18c3816a39094b7179261ddbe3e1d487bd6fe52c701f15fef1d2c81e056543325f9aad29706e1d20c15f6cc56e86c6ff28e43a2031a46d9f75fbbb4f71ebd845a971718234301411dfba718871304c0ca7bd8b668807bd12c8ab581a4cc051008fb4e91701f25cd143ba5be1ab2d8b23bba46cb2e8bc933d7652689adf24dbd69d927512a56838b8554fccb728400284f61fa964ffc998921546fefd743554c5f09433912472e37e298d3cbb6e8274036817ccc0875bb8b4316de189961da0a637014ede1abe84704fb03a287c9fc828dd07e6bf9a47e8e8284841bbef418d1571fcffc03943855b2d0d261814d8b52f3788db85f4576559cb176be591eb459d9bc3e781b6a2ebdd7c5a7ef2dcf5357c9bb58368ca4342cb172cfe77aed44223799ffe8d42e3984c3377ab500245a55ede7a20a986d0b48835f447f772f2bea29613c699f8d63d9ff3490bb7c11f1be0a5450dd2f9d122aaa56ae765bbb9bedb92886674a819e89313b17dfa16cf4cd24af2870de06ab5220557b24f8b49c3cc09b026fce1506a4f82cf3f601c83185b98337ed0985f3dbc14ff977997a7b4e5c7b81772a96be04f6280e6bb2b8b997401e387e67b31ef6578eef0c5b2bab757f4f7ca965c709a472faa3ef3557a49eb06c396ac988a63e2d3590b1b4cf5c581a2bf1369ca2f71690ea4ff128ff9bcb6e0276c40fa3916f8b170d5a3a7946436b880906188aadabe90d0ca5ce19b46f1539a36977c497f2e35f1ad48ea0da45742cbc67e08fba9befee0b2d946bca6380fc3dab0c5f89d36cd5fc75599f166c78e7a86c6313b225ae944d191fe570a7ed54515a493ce5b838a723e0f6c5d2b24a426af46ec4542abc0c346db5790416c3b87a4d693be18da75dbcf735f69f19c6ce81c076c0d8b8671622d20d64248fca033e068a15effe03b4e0ea14bf4d8b1dd19c5b300ac711d76868818b9d3a46ca3432e9f7a568ea8eabaab337b7c8c1938fb0a89d8c803232fd4c0abe33dee730c61aaa342ffbe109998450e182140d77d8be63c04d132c932a010336b5f8abb915c24133362b186affda27357d4cfbd4b23b880c3edb73075fe3c44261b97dc4e754127bd315f1c1c726a607a92417e0292784155f0c9ceee602a29d8a236816f398b50b5e1d3d1f7409ca22ad3d228250f9403f45b43ba43f377dc3e5f20ae506a007b2d9684ed72452a737d33f4a632ccd6dc577f9bd7de09750b04a1d9c6ea279f699a2f0059d8bf3ae5af99c3bb0c3a04e7ca2c0a4c52112bd1b8f4b8d0169d91a2d82095b17ac959902384f4df0066ddd93edeeee3293705dfc057d57df6daecbf84335716885dfc43d268af36e509c7c6b962e9926a58b4c1f2b85ec71bb008eaf48dea088ad2245bf5b709e833335e8bf3ad4f40dfd8f85191208ce91afc5c8e9b429d47b8ca29a7db10354263a8cecd7f23a2240796a8cdfef148c190d31a33c2a343201f76b3eefeed739cc4191bad9857787eb64b65bfdab47d4841a94f10dbb9d3ad27f98b771f9e33e94072934580274ad286f6532cabd78ac24f81409e4d0b44053b19a71f60a285d93ee0cb8916084515ce3ca21c0ec435483069544325d6adc1c98b425f18b9091c82b095985543de0f4a8b98819255c1d38ed6eadae06752d79c1976c5c32fcc475a9d63c2ee0a7b8ef65c5b57e73e03da24261b61978a5279555746722ceb8c79a4a621c8f4d6ef17e9cf2943d413d4eabe99d05b74c24d6f7e39dc142bf454cbbf37c774f870046b7aa802faae3ea3aa1c139c0feae38d7a8eee7a445669e259f2e0af6d2b1c6003de40d2d38b8f8cd895824849140ddc9cdea2ca244a7b1a81ccab6ce30bc5d66304e022a71cdd508ffe6ebc6ead566812170b597dd11b9bfac437d553e20e73065d382ce6c69a49c5357485d6b841adfad02969baf16b94d5f60812047bf44bc9f3676dcd3b087ed45e700888ba7514519828ad1cae503247dab8baaa43ff958c31f3a51b015f3a68460e015b7a3915d54fe72db355748df6d312eaef26242196db03f5a514e3de1ca15b18915972f7fdc420cfd89bebd436970b0262e133622072da625b13f6a27691341fbbe80530b7d724a4d8ed97ded124c381aa877f0e9f709a0b9518e4c47b5940eaaf958e318f34d438268f930db410f9fcdadec9c6b6b184ce3aac2be", 0x1000}], 0x4, 0x0, 0x0, 0x8c01}}, {{&(0x7f0000002140)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000021c0), 0x0, &(0x7f0000002580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee00}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0x0, 0xee01}}}, @rights={{0x28, 0x1, 0x1, [r0, r5, r0, r0, r1, r1]}}, @rights={{0x2c, 0x1, 0x1, [r0, r1, r6, r7, r0, r8, r0]}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r11, r0]}}], 0x120, 0x4040040}}], 0x4, 0x40080c0) 13:44:44 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb26}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:44:44 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4) 13:44:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)=0x40) ioctl$KDENABIO(r0, 0x4b36) r1 = signalfd4(r0, &(0x7f0000000080)={[0x4]}, 0x8, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000000c0)=0x9) 13:44:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000040)) 13:44:44 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:44:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000380)={0x24200000, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0, {0x26}, &(0x7f0000000200)=""/221, 0xdd, &(0x7f0000000300)=""/33, &(0x7f0000000340)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x8}, 0x58) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) epoll_create1(0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) pidfd_getfd(r2, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x38, 0x3f, 0x5, 0x5, 0x0, 0xa8, 0x64000, 0xf, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x100, 0x40, 0x3, 0x6, 0x80, 0x5, 0x1, 0x0, 0x7ff, 0x0, 0x9}, r0, 0x8, r1, 0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r5) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5, 0xee00}}, './file0\x00'}) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r6, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r6, 0x1) [ 1677.964031] loop2: detected capacity change from 0 to 48 13:44:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0xb0b0, 0xffff, 0x4, 0x9}}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:44:45 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x100) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000040)={0x2, 0x6}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) [ 1678.003720] EXT4-fs (loop2): invalid inodes per group: 0 [ 1678.003720] [ 1678.019915] loop2: detected capacity change from 0 to 48 [ 1678.036908] EXT4-fs (loop2): invalid inodes per group: 0 [ 1678.036908] 13:44:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0xfe, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, 0x0, 0x3, 0xffffffffffffffff, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:44:45 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4) 13:44:45 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) 13:44:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:44:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6106, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:44:54 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180), 0x4) 13:44:54 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000040)={0x6, "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"}) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000280)={r2, 0x0, 0xab78, 0x8}) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x6) 13:44:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) shutdown(r0, 0x1) 13:44:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) r2 = epoll_create1(0x80000) tee(r1, r2, 0xff, 0x9) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:44:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="f36b653000"]) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f0000000100)) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x400400, 0x0) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000080)) 13:44:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0x0, 0x400000}) 13:44:54 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)="aeaf725794a721a0609de4905463c98f9cb62dfac9ac9cfbb8a409577e6b581e47076adb7e5c135abc9ff00496cbc686c14a05f9fb6abeb8d963e46679f1013bb974bb56e70ffdec422b0ba4d552290ac15d5e9f1467589fd3c9924030bda4b4a8816386ef3f570436d14fb8e3d18008566aa0cbdabb8644afc04cd90270e80bfe0887beed2c766c0399088e5e2a49219d382675e39ab9b2209f665801c09ae6f6cba8f85aea0b6c15fcdce5dd350010142ec0d5b6b31695d58377a1fa97201fd566257026b8bc3d0531920f3aa0e0642469e3563d02e6f7aad11ba1b088dda8543a63dbffc49aaa3e03ff549a0fbc", 0xef}], 0x5) [ 1687.318633] loop2: detected capacity change from 0 to 48 [ 1687.338496] EXT4-fs (loop2): invalid inodes per group: 0 [ 1687.338496] 13:44:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)={0x14, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0x4}]}, 0x14}], 0x1}, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r1, 0x4b46, &(0x7f0000000000)) 13:44:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, 0x0, 0x0) 13:44:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = signalfd4(r0, &(0x7f0000000140), 0x8, 0x800) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000180)={0x1, 0x1, 0x3, 0xe, 0x31, &(0x7f00000003c0)}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x20, 0x6, 0x2a, 0x0, 0x9, 0x0, 0xb, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0xfffffffffffffeff}, 0x11000, 0x8, 0x9, 0x2, 0x3, 0x0, 0x7, 0x0, 0x5, 0x0, 0x186}, 0xffffffffffffffff, 0xd, r2, 0x12) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$TCXONC(r0, 0x540a, 0x0) [ 1687.357246] loop2: detected capacity change from 0 to 48 [ 1687.368670] EXT4-fs (loop2): invalid inodes per group: 0 [ 1687.368670] 13:44:54 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180), 0x4) 13:44:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, 0x0, 0x0) 13:44:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x1) 13:45:04 executing program 5: sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x1, 0x8, 0x801, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x41}, 0x88800) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) 13:45:04 executing program 7: perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000040)) 13:45:04 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180), 0x4) 13:45:04 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) r3 = getpid() r4 = pidfd_open(r3, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001480)={&(0x7f00000000c0)={0x13b0, 0xb, 0x4, 0x5, 0x70bd2b, 0x25dfdbfc, {0xa, 0x0, 0x1}, [@typed={0x9, 0x37, 0x0, 0x0, @str='\xaa\xaa\xaa\xaa\xaa'}, @generic="ac51e86bcd4f4db1877d213ebb6db3a6059998f5abb4f097936bebb856595470f95a4f705d767597c9eae7b899c997214cb34f823ba5fa1b5b51d98de4596869cca8c4ea9b9de3eb600bbcf755e47d080e1b4d58b72d9cae21633be5fe90d4e94d6a2f5d60c4c3d35c0f778cd4998828e18c10c49c841ab744880e4ecc2fc49f", @nested={0x4a, 0x43, 0x0, 0x1, [@generic="77b508dcbacd38b10f57c2453de1339683e89b123d3ee1d0a2ae0c62f0e2d0361ac867f86f8f09ed81843a4c0b5ac4d7f42f4b595a5bd59f4b63118115e8e229bcfef969701c"]}, @generic="99bf108aa58c32ddceff836136ca01152697a17b00a024115e1a11d699fab74235c7c80d2c0c89340a5e9337ac76b419da6a317417e99dd3328ee34ac7f5b3b658318bcd78bac12e44ff6f05dd4b1ef4ee627e1b47fe9fd4b78e29d16de10d424ef810a9e57cad5a3bd012a4afcd8278fcdd35476412fc0000e32e4be87a98914220a0e41f85371c6b64e3f79dd7a19aad305e0d4a874ea67dd0c6c7048ea6d4b2c54c6098d21fc96ac2260783851168c08e30adff844ea6bc9d24558cd15d249c09d88e00072751a1e23c22ae6d3feb399838", @typed={0x8, 0x78, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x1c}}, @typed={0x8, 0x4c, 0x0, 0x0, @pid=r3}, @generic="98d204cc252fcb74573dd45d69f182ced9d7b0e02352e79d08aa6b0b470ca52d3fd9e7353eacbd9fd3d40b25c37ba4105ea25548c9d4ca0f0b6d1ee7cfb64ee52b52e69a4e3ee9f6dc46723270c9f378b0b868b8aa320add6adccd2873589f7c77b93bb7fd150002aa5c115f1a9f375730d04891224f5fd999c673046b9669bf187f73759cab294f642d99b678a338988884ef3983c15128222642288beb150b5585fa9b64e88e466d68129e0713d9285d082705f1d1cd835a65fed9988f8132e5c720dc3e706abf349f6a79ce460b37894187963836382f47ac5bc37da1819d11e8059e5f05df024745b92d790033dd2e1528aa6f1415de22f20eaf3b309f145b2202739eade15b47704fdaf3f2222cfed12ce2e892b9d6492cd8c7cd42db36cf0b4b626b560335873ed8809bfe565ecbedcf9ebce27f3c73794318be4030b1293a0daf032740e987718bcd713e9c815f2df2c129151898838073c4e875923ccbb80a2e7e78f3cbb2b8bca0b86019e6a9376f5555313b16f8348239db1d10147c6e2e78486d2186703bf471977cdd43a9d5082f495445c42f6ba7b820cb01ae5abb2e615d7619c76803cbfbcac0cd4593259a87a7970f4be818c8483c8c003b33fae34544e9332a9d9e9fc14ca3ce7e1ad2c8e2651317ceceb406ad93bc0ea73feb57712ccca6e5385b7b63f7afca93a22be6317b53f02d5d8f9da483390053def868c1f6ef909ef32ed604179b752d5b29d55ed401381a74a29a45dba90e467dd230ecf1b58e1927cffd3e6da221341b52ca8abec9920ab78943dc7343b7cbb116f719bc2717dff89f2dd2cef9aacb412924b6d2ccd1b1972bee26be2c12355463f918f1f48970d557dedcb56a436b147b982d806616fb761ec404ad5d8e59c0916dad0212d10eea035946b5802d6fb6d1b6f74c137d2df48f23c327e56209968f70576e334b220aa19e18811443b266c374d894685383a3352c3f54693c44fecedc989ca799baa8f977e2e773e4310b7c8b0595a4c2ccf011a30a58b662e7fe8d47648d8e627cfc676a7f51cc54972c2e24da327ef5c90b7b84074f0cba20189dc74b190a995e966f2ea5b85c615d5c05fd5993c373eb03f2076e9398cd5bf57c0614ce3ec06cb9de1b688be6e097870469682229e5d6c682927adfef3f331d21f12a8f9ecbd94f70b6bddca720e6e0dac1672ed20539d2074e68036e0d06ee439dc264b4271822e606e119e05910078046e2aaabcbd29dae1fab1e91a113775fde0384839c9d3a4e9f600204bb5a47902f2990814e44882e1b1886e53156a9c381ba1f8dfc059f805c9402c467c1368851996c86cbcea37d66868e13500f6a70f1f3518833063c60d6e4a06d50e67c6e2331cad8be91ef2a335300f888609f39f4d472b72a3208e5833b8736f90cbc06bc91b9d35291e8a41f8b4a537aaf525a9081504b455dcdd6774ec71d524d45b3246fe2295581765eb86b32b89794583f4b4143c6ee118aa3b354126217e72dbd5e6b27e60d8f20c08caf259a8e2082de759635c80e1e3141e68929aa82e25e04526c7d80cc2968ec1539f6ddfbffde489bb756bf70f968a80b6503799b692fc4a171c49cce9cbabc2be28b2727d6e3376d379839c4f2a19aec8d4d40c5bc6542e99dcc168e53277d2b13a4b9cf6d703ea9ec50a76147e3b500ea1130b17280ce7a5486f03e93318ea61ac014f9bc2530a0438ef5f6a125815a1bf0d27f658a029e72596784aa25016483422ec61178e91c26449be7a9954970e9d32d683e32553141e7f0e51fc12ba8aa20ea3f8f9c2c5e2ac404f55d3386bca1a08e05e073c73324eaa4cfe993f915cbb70361511c224bc1177be3fd7bed41a0de16e9a311e445e0e50593de222dae0c0a754915757522ecf98a6209f78b3fdd7b7931ba4ea6b8a8142a92199ab6483696e4ca9b7f264f6c7617de63999792cd95573a5804dba22e7acaaa74eb6f179ffed1d491e536d86fb08508887ad624b7c96cbeaedb4ca08f617d0f8a743414cc7c8c73e3de566c793c98efddc4dd3a07bbc4a0b04731a6d8bf56e1344e311e04581f36a0b51d91de08ae08607a3770c0fb1925003d6b124bee59c8934f452d79ad91e5f7c4690622f6f505bef9c4616687fe880da1a713aca892df70d7b061f7cf04841102b30f50cee4f5849f1ebfaa6e88ab7617edc6cab190d298da9a0d4bb4f19d6f5164ba84ad1eaa0b496adeb53808eadec04053159ad50dd328af414198677689dd06b8b79710389bc4a56835420381061c3207dcc04c1c4bae16178a30f6298415de2809f45a875ff011041053e932104ea4953196cc9855c25102c4862dec93984f1de5f568db34179fc32a0215b9024e44a1ff55be14294907864a51578c418d50e2d558709b41cc5bbe3e76ff6fd2e731c3eafa08c158cad91631e4b7c47ef8e2e9fd972f4f4add5a97227df4886664568f557ad74ac31da51afbe722ef0838aaa3aa84b24b6a2d3bd27ab9734e4a39ae07d33984492c3b24d80520576bf94c4b9464540adac225d89a7228807704e07d0896410d782612463880bf6744d1a6b83054c0a831f81a34b6fe1d34562872efd713eb31c8d00caeee21e4ff1962c8dc6698b0817ea21c9898156f00a5a9de0e48a0a87c2ffac66d50891f81921e337a5dcbe0b5a950d26ab8b71936d69c4b480312aec3431b5806dcbc13b53b4e329966adac7ac9144303f1e1db70d1fe77dd3003ea8847fe62c5abcd9f4b2b2e7771319b8ab8c80bb588e402c38312dbe846f9f7ffea8a36f715915422409aeff9369d3a01d86c5aef5ca7ac891f0fc85a9a1163c742a43bb9f4f996f352856d9c3cc540da8360c59a415de368a5d1ca55d83a0528943dc09e42074f072d562da1a628446b29610d09762c93cac007b22bf22353ba363e28f444dcf3925e202c22715c1144496ef25e8306349ae568823cb9031fad883b803d47ae6390022b1b927812cd09f1efc1956e15761f6c0dba09db880e2a8ff155527d90671af312a85dee5f16859d01cf188618bf12cbf7aa0bf9450e5cb34e83eadfb66da8b7a5280105ccb03059cf8d8537bb15c5fe93fb8e86af0082ba4df1c384458a4851f9ae043094c81423230ba4cbfbeed1215248607e4df1e7a6037622cc1315f8ed0727ba1050ed51874a7a47fc25e43e5451e9938f6733069a2d2eacf2212eda75b2a718788006cba376bbdb7d1efcabad54d4b23e3c1bfeefaca9cc208cae3bf5e75e1b38ad9375c4d5091b5c807e4e76ff3d5e6490224d2d812be720a8104a8e3fff9514efbb830a801b838c665ae81ac58583b2c6d6e88f0d8b98797eed578aeea02ce06488d1f9f269bc10c267d6df4d64ca9a4c4b51521d2be66d7335cd8b6659069e40dd180452172dedf0b8e891f8f3256585a024fdc414155107d727579c9e633c4e05b68dac69b8a0ded3a1ffdf1817d818b8e2f929db3c74589f15de605bd8f51e6082015c698a5b99b48beefbd8bd4cd03d44431dea79f4551b70643f85c3bd4a2ea790f6d6e1da842c4bce89526fbe23feb195a2a28024b9399a79a38383fa3c14add0ae70319dd3fc9fab732984487b6a8e13a1d981874bbe47d6dccc45e3d9c6d4c6fa6131b1224f324ed0cfa5152fad7d00facd1eacb1a3bfe965f974fb9e92fbb98871888ecd31305a56999aa677b7fd27453a107d225aac6e8862c149f2a15a4855a7cdf55ce7932854437866e58c1c0eb991acc35fc9952c0cee0af2deb774b25f27a212003df6d43d914c2af2fa13572d475b0ae1821709be1b648176caea93ef23971c85a1bd8fd9d957675bfc8df20eeab067036ed6cc1a72912aa521a9d2bbbe4951ea780c22996a37610349f07356afe61ac3b3a79d9658c71c6355db4613357091b367e6680f4b7f08cca7e1f514e0b697472de4f1f68b573c6f5457802228da3c3a7e372d75310932fabecefac272f576271c4e995a785919108f8eb21e45a57c751ce09a1f3c4b93d4c06dd83d1d2e45c71a3d39758bdff5038034c77a41c94391eff810d2f988db2fa52d29e73463a9bda7a6e3016f111aac435a74e321b72f79ce0800423aa0fe64f09006f121c859a497dc7a87707b26f95b50f218d5ed2d42ae40956a6a539b142be5f6de47474a234bcc35d4d2a63be575059373b1d4c264ca9cdc8e41cd2b585f59f71e879c1609dd2bab2f05b9bbef2df5805ccafa72ceda4d2430e40ddd76f674c7fda12bbd86b703727b9f08773e1c4e428a849cd6d3ab45a091bcbd4cbd8753a05b28877769dabe83067288cd0d82348d5ecc81946be82cc3090e6470f5514d805c5e9c33dc4f5c97894d2628927cbf2a644cce8f2bb30a497117c42a5655d3ab9c973afa97e5802020e2fa95c17b5063ae1ef7b27213e9c78be54903f3b415d76afb66837d2b699b9356f4c4f0dd75db9a19d137a65c531a0c86b78d853b56fb4d64a802eec1a5e4cc881d79c539b78b6723d3eaa9d6e5ac492c86abd4775b4abf37829fd10198a68ede66f22e10e46d6866d5157b53a523cf6f791ef2e29d4bcd832ef61c1038243e4f8abfccb2a7ae9fec7df9fd9c0680eea86c9f480c3caf11098e5a3c64065a133bd7eb95eba9d4eea0b32cfb7d8c4004c7c9fa7251737c8ae68e7e59eab403bbf53e3317a71a42c3f2450d18266a975d5ddae3c99a7542770f33850242b447369a3809929f23093fa6b087abe971f601c0ae2a7182f016d94a679142d251a1a139342780329be6e10d29ed627e4d906b9feac63da271644464b63fdf5604e052e322b8574a3538004538a001b459decd9d89ee83bfd8374d8f90f953f4f5ad93669fc71d13ed7541f3e11d1fce5bc420171bf13a3211f5a895699b05e60f5b382921892b083fd68c887b148ec9116b9f16ba96975b39cca2cc1092bc2236a792e18a26614c56816c85b3a7c524117a5edf4eefb05db999d067452191d9178df06acf66fa99fe5484fe36d0087cf971c466d7eb177ae1881b36ead678c7b36113aa03ae7077e5e72d5ea8f348f5c7424488209793709f39ca60094eea43d19a9d1719ca11bf1bd10d7282025f5066e52c4377af00066621aa6a64373fae5ced950937ec46bfc57b9b76213b3d8873e25d5e86f1afd3d2f60f688492c820015402f36df7497130d031c5f922280c1a0eeeb653170aa5cb91979d7815f05e4be22bf3c61b6b43e93c841b1ebbac5e3d67c55791f61df0bf8a0d7bed7803a0ee7ca61baddc6c8a96bf14a048dbaeefad9b41812c153e41e0aad2f20cf840f764a5c193dbaa730d37d3e57403b6ef103d432d4a6f1061b848a4e51487a1696a08de037b59132868e921bda452eff7768660ba7615a3de55e3bd8c079d07d1a023874f2b5805fbfce849eff14b662a1eeb82d18dc8f5910ec3b36a5b55c503801a0692cf48ed4a3b1f3e25485906ebf0c4c04309b661d64d6e2cdb9bccbf6666aa7921032f0d9aaadb55c15e975fb4ccef60b55f04aa3eba3c4f612af57a25f28b2ed79c929d98ca1696e954759db933b85eb1ddd73792beb4a8df654afb64dd5351a927c0e5b62dae0a38472423fe61544da3da1e389e5c5ac387ebad618efdffdea0f97f1128b8d7a09737694ff751305a1b90e2ea7fdeefda24cae02732b2cf007e633a84607379e0f00a930dac99d632434a825e694c448563756d57aae4bdd0aacc118c234f2e8997c732a770c42e29f51e6d9346395d92b6273f58d507d2be8adc0041ac1d2b7046071b2cd1e30bc29d0ac2f06135c88a16ff83088960c57d645c", @nested={0x7f, 0x8b, 0x0, 0x1, [@typed={0x5, 0x30, 0x0, 0x0, @str='\x00'}, @typed={0x4, 0xc}, @generic="d43c60d76fe0f8ef46877b32f68cac351027672e030bb80e752224a169ae0a1d3d70ec35d0b7f833250e3703e1f6f2a360e18acd5575cba7e9f7ad90c11a6268a94bcbc37f9421d7c1ec1d4f59759c7e63d25b4fea57dbc765f864d7f53aa827ebea01df5c3d27ea2fe5fa", @typed={0x4, 0x5}]}, @typed={0xbb, 0x6b, 0x0, 0x0, @binary="d27b442a2b05117e6820836bf87c01250966eea15388c8a182311ab5e84b82283bc32e7ce2d93c04853f35475f40d545a3fbda1edcf97133ff03ed4783a21340b7f13e828cc8fd6352ff5c243688cd5679b436fd9808aeff19b67318c6a4f3c7d36c14e38b8c7543c0c06c84f2f2fef53ff4e76135249294f85a61616663392b40b54e06de922efbc8193d755fe7279a38feeb4370c521e7d8135f2e12eaff90d4ae9f84e5d70cc403cf20be8bf2c8a0ffe57d602d7629"}, @generic="4b105f2c2d7d3665da6b5de622cf10f544e483c42e716cc77310b70dfc332fc1bb04495c85062034b4391f2f234cdd762fb7f9d0c483f9fb90983b7fb982642957571026c11bea11588e87ea1951e6879d6ae678b83271d8363e58a28c1ee5c04620dc4441044afc170fb44ee4bf18b4c7ec7ca84debe7548370736dd4378777ba5c66278e7ab80eb71e3c142635a0168421777a3b51b2fb6db808f660acf5fa68cb17d9d7"]}, 0x13b0}, 0x1, 0x0, 0x0, 0x80}, 0x10008815) r5 = fspick(0xffffffffffffff9c, &(0x7f0000001e80)='./file0\x00', 0x0) r6 = accept4$bt_l2cap(r2, &(0x7f0000001ec0)={0x1f, 0x0, @none}, &(0x7f0000001f00)=0xe, 0x0) socketpair(0xf, 0x5, 0x8, &(0x7f0000001f40)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001f80)=0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001fc0)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002540)={&(0x7f0000002000), 0x6e, &(0x7f0000002400)=[{&(0x7f0000002080)=""/234, 0xea}, {&(0x7f0000002180)=""/184, 0xb8}, {&(0x7f0000002240)=""/246, 0xf6}, {&(0x7f0000002340)=""/71, 0x47}, {&(0x7f00000023c0)}], 0x5, &(0x7f0000002480)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000002580)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000025c0)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@private}}, &(0x7f00000026c0)=0xe8) r13 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [], {}, [{0x8, 0x0, r14}]}, 0x2c, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002840)=[{{&(0x7f00000015c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000019c0)=[{&(0x7f0000001640)="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", 0xff}, {&(0x7f0000001740)}, {&(0x7f0000001780)="f5d7def96264e75823c858e27c138958d0eb34a1ac28b8f9179e455966a4c8b115eff39d40f50986b6d81de307e50854cd960631bd170fff5ddb5d4e26b2c0a6d8d04c4b36865d549b6bf7568c01ce6265145d2b1f2cdbe6e695a95600312705d8846e313f5842ddf95034461ea3e6305912bfa45a618e8bf6b92ea66cc4d2e9b9d60b361f3539f4f981aaca6d1d5b1181db281744f0af0ad4d8ead12f762f770d45c0046e8684ba2ea70a3cfc82f4b642557b04e31fccbab3ac25303eb4f5658ead475f8ceb93d8d217821275881abf0dd214a0dc118fd567d86ef031f6adc3877db332254acfee881b92f5ffcf386c0f01f261ae382dc0dfe1", 0xfa}, {&(0x7f0000001880)}, {&(0x7f00000018c0)="a98ce1681388756552d50416681694de67673936d0f9b3a7328358bbf59036c6ce371c6654c811d55cead966182e80828466205cd165e31f", 0x38}, {&(0x7f0000001900)="891556be3e6bc38026b2df9c405d873c7d5a218ee212ba6c0c40c7d6b9979b5c7e6aa111fa2a82cd93e624048445dec62a8b1d4dbc98135dff01", 0x3a}, {&(0x7f0000001940)="add678871f77a864f81571ee8cbf866bfd01701b452ac48fd6d7faa694e3fdf64ccb29d48c0b7fa04eee70612b8bd75f37caaba5ce0cfdba56eddfce36ed53a7713e60d4b7cef5e5a6d6ba97aeea525878ed5176f17060d03d950bc09437888f7c7c51eb35", 0x65}], 0x7, &(0x7f0000001a80)=[@cred={{0x1c}}], 0x20, 0x8001}}, {{&(0x7f0000001b40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000001ac0)="81ff80", 0x3}], 0x1, &(0x7f0000002700)=[@rights={{0x1c, 0x1, 0x1, [r1, r4, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r2, r1, r1]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r1, r2, r0, r2, r0, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r5, r6, r7, r4]}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r14}}}], 0x140, 0x48815}}], 0x2, 0x4000000) shutdown(r2, 0x1) 13:45:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000080)={0x5, 0x0, 0x2, 0x1, 0x3, "95642ce04bda990f60cdbd0912485c41ad72f4", 0x564bda88, 0x3}) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000040)={0x0, 0x1, 0x1d, 0x16, 0x0, &(0x7f00000003c0)="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"}) 13:45:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, 0x0, 0x0) 13:45:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)={0x9, 0x8, 0x100000000, 0x5, 0x4f13fa59, 0x3ff}) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) 13:45:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6206, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 1697.197059] loop2: detected capacity change from 0 to 49 13:45:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}], 0x4) [ 1697.213885] EXT4-fs (loop2): invalid inodes per group: 0 [ 1697.213885] [ 1697.232396] loop2: detected capacity change from 0 to 49 [ 1697.246345] EXT4-fs (loop2): invalid inodes per group: 0 [ 1697.246345] 13:45:15 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) r1 = open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x9000) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r2, 0x4b46, &(0x7f0000000000)={0x800, 0x10100}) ioctl$BTRFS_IOC_SNAP_DESTROY(r1, 0x5000940f, &(0x7f00000001c0)={{r2}, "d25d4e6a55a761a2503209acf780e594b7df5a70a145b44bddb476bec11f9be51cb4f5636df50a496ebb3566b9f626dcf402a36d8eadcb22472d8574d6aad9a395d8031132342f273967d9e1e2e08f6bab2b334aff4e35f964b0c79c6ea12b9c00e3b489f1944f21891b7fb914832aaea0d686e3fcc52b20063baba6601b3e5a8a0fa27af50931c33e793be02b176833ea9001f86e44270b49858125f847c29469de8eae5855a3a96a97f5f698ac629bb8d89864792218f787c9942e564b99a0631b89177db3f141c1efd1bd6217c25bbe7c5824a4eb3af3b7a6ab2003ca7b80f31eb14a56a4e2707ccb80166c86ec8eafbcbf3a55b8de78052e1e0f626c7a6711fe55da856cc2e525fecd43fe650091c7b778ce22df327273cdc8184b383da7aae6efa69a65334ce5f65f6806bf7dd8ccb0761f2c96ec65756fda8ffc4c971e3f5b13a323a76f6e0f43d1310d94a8108081a1b32b3a99a4fe54e925da5710c25c40ade5769ce74b7a9f2fb74c3e242fcb8bf3e7afb40c892554e4474ee64c1c7bf5ba89b599d5d53e9a7aa7e24dddfb3aafcb55e43c0b81d5f180a8e6948f70bd842a51117022b5653721977f118cd5829c632e2f8ef16c9ac03255a2bb72685b853eda39bba5b24b55e6cfb49b2cfa8a60a1389461972c04f44a9227551ac18c7273c6b4f25814b6f4add94f9e2e656e4583adcdfda7184f95ade6b1a90c0f5fb1004a6fdb5304d7cbb5b2d6ba52da9d268d195031aa8b33ffc9a1b785739c4cc292ee41608b8294d85a3edb26f2f071d4f84be8570009282fb8f425d70692b54fdfde148f6395be50f51bf1da268a28e85f6d5de559a2893d1160482cd57a6eceebf75b8cdcead70700e1a5c0ecc7a2b6b14e2b2ae7c400f15ef0d7e82440e4c1ee60dcb9fd7a455abb9d3d74c2401f1f62483781bb1c03c40e5051bbf173d43dc0fe8a146444e9aed3628976003b9bf1cf2a9f466a87652dd39038aaad8cb8372555c37fb07b881a7a46d9cd6a123ee2693ba064dbaceef7fc47ebf3f5b60a2ddb9741c625d5a53fd576aa908905528e6be10bdbfda19a3719a62011339844fdf3dc0271a711af458c46921445c4e7f7167a6c87d3dacd6cf90bfe6f5bb6f6263d0acd41726c7b05bd2bb97ae13119a4e637d97c54422940f85e0957a7e50f221e4ff0cac87dd4a845257a1265b64f748a3597f20869c3dd6057886b4137887dc3e5d91fca7fa1578110c549be9d31e69c0ed68efe50b7a0204c1ae26796ae915c4bb35e76cdbb605964b054c1f0f15ae11bf7c91f72ea20e9b7ead493019c32c286efa6efca60d4f51be5f9cc71f575f1ec3823b86299d3d3aeb999395c7b48d645c68692e52695e51fce5dda7917ac1fd509cf08d6d06c62c82c26e9e508f86b1ed4753a1a46689fde95c9ef3066d583c0d44d48fbc725e8bc0a3900468a7cdf7c522e9063d8bccf99b7ace6b635a82c236bf4dd42d2e19b2e02057ca04a25d24f35113a1f30b43caea72b69e616985ed26c646e7661c598e581d43b6ea48c6b9b2932910a37d61947fd37bd152a93d0ec4d98e21713828ff7ce8622c46750befa11eaf6df3479903612db46de5e1597131684abfe7f6af9389639e50a5fc4d4de6f6210932812defb720cd3d86aa6dd45a3b4679efc74547f3bb6e77640d139f5ab5b5edec3df3bdb91105fbceafca0206b4949790872353e47bb743a3fe06d4d78150d8f6a9ab5796ea661db122c970170ae4b93d68486bc08f29dbf3b060cfb8e064a4d308b0a9f3dee6608056b41a2a090923dde54b9f19a863cc36d27d30dd4389231a99b8871320a759c3859a77fc3bcb5f691ab4c084365389fed5afdefa21c70655d4d2874fb6d17ba83b36172b411bd29162cfc28a29de17413f230a098913913b6363b42750ada8efd106d777627d32c42517d3a5830d001131e70d25df4aa925d9fc9210b134b09bc7dca2a82e4c5c44c2e858ea66d913d059b20645589f026033c96b3b3786bfeae46fbae5bc3a439d42071e7521af1e3fa89f6ce0f6c323c474199cf92a16c36eacb06d0e7b3c422bb2437c447d248e83aade27a3f36c8ead08a82fb870658a521dcef44db7765c52f8ae6cf5cd53c0f6c6f784b60e67b07f32fe93611c9e38f191c2203c4ad78346d1a42f474d1f0033bc8f131488f5bf212d3709feb66f732395f130c318d9b2b057d4a420b6b67f0e50e9f6d0655a1db8c76cb1b651edf504b0c3006bfabf240d2bf16549be55320b3eed235e8ee2b0492b60b91f191cd484997b204eee18d01399ff3467c7651640bdd8cc0a5078bace811ea35e73fe705a93f42dcc73b367c74f8cdcc2788b4962f8ecc003cbd04f67988dc2cb91053a7d6636e8cc9c30051ec9c221787efe6108b1ae225e0eccedc10ee676e1f0f301c77cb764366f28445bfd6396756b466d487a9c618bbde93f99b4c5a499f8eb1a6fed1c0f8ffea344754c9c218356d10b869f6bb5ea6ec0a8dd80e8659db2faea7b64ab41c00c885777b48af25ecf94024605312cd5e228c3c14a9f6d405d48ddaffdce85d7a910863644712b85a5fa13712a6ad8c213e1c06c5baf6b8e86c47791d7c100f1b52e977601233d30e02dd1a575808be0c09f923cbdc5f534301ee588bf59072c57b2c09584ca7a5172e543b6f1da4863d8013379cc1112551f11289beb25c507c5bfe1c5735192e9a20dfd460a72ee5f837a094ca9d6dc9393f43374990018111f9e61b2275b17ec99b84679a0604071d02d7b78827de9822627de420f891584db418102d8d28c09fef11433ae79ed3381085e1e489f8457ba2bd225251d448fc80a3df2720db00b731ccb7421e361682f0103884eb7c7691a16cbffe65a416224b25deae49f5d973cc13a930ac18c4893205cdb9141742c6592f2bef6623fa81234447604b6e3da74dbcc887e2562794427cd9ede7439abeb204c21302eb890386044c91ab89528e257cb4e996c870f69759dca74948449df191f737795bcd6c853e673e0ed0d325330529207c26d901206e3eddc9eb920c0e608d9b832ad514d9ab18b4e6041c91b8e2f7985e1f63a61e378a9222507e4c79702be190aded90eb777253e0f108ae8d5ff6251bc5ea6f3dfd78d12e06a20f97e3cefe4c0bf2e8ab0410567c6e5b0f73c788c1adb83760d860012217c20f0086f4bb827dc3650e6f8dfad9b2561fcd3038edb11f52100501771d68044c95100bd9a21ab0aaffd98242fdd4a603046577b1f7d9e08a8503f12836cc15b814e9a3e88a74a6f07eb70d78c4a3f27c6ef62d2eb7d4b67edfd9141de094bb950ecc58f3ba9a48db5512c98ad1a3b0007808ce6a6eb8cf6092750d14dc5a180465823dcc32fe9db2c8397c0ed425576e353ddd16f14a4947baf0f8c1531134e2d6a8b30d050508daa06b0a84d286f08145f1ad467333480f4b1430df71d3ab9fec89d832ff74a86e3bb58f95979cc5f65e812a94c883ea4fbaf78a0f434fb234350a9ce5eaebb68d8b659b4656c478d41dd164d253eba3d34872fbe2a0d267a1c04c21fd853a1dfe35925ef5b8363b465d2fdf5b5562b062bc9daf035797477c8f5f1067817db3a0630aec1c999219831630957373a91fb8c802b039cb24b33f2567e25cd2f06b39d83a1c0255c3f5d65704fae72371127a288f3def5d4e9c38f710b4508009a8fe7b607cf345006fbc4d3f980f35d8d05e5d4623010ebc20269119748d69d35de583dd9becc22550f1783195e6fddf16623cfa3e4ac8e93d99358e6d0806586e43c8dd3540229f7f728923647b95e75c306ee2e7e472baca8a3ff8f67059751fd212d2187d711c5cfe2e11068d1c963c1964d20e6c3de1e40a93501321cb41deb7bb3f36f14d51208659680fc60567128f8facd3da241fb00be02c32f16dd71679e7211e149687d68433792f1995e35a80a453c9e987db86ba92d7a00a3de5109ef3a714225638894f2a1dbe078d9d439e0fa00864edc899bc93ad146372bfb511a17306c19047930e4e992e6a1d7fa9a29ab19a1d246d8605d6def9b669a0357789971d37c90fa4bc052848a1029f5bb8047cd7995c494d04cd59183b2ae682d037df8820d6b5bf258c09cb6b674a5ee3e97405d1b9d8dd65da1c1a205aa4d09519497303edbb65ab8f62bd25ddbcd74d1cdcfb15d4dd348d3ee2161e15ddc2b242376db88722ba42920e63642828d6b14720e6f4d88921c1806bdd388bba490552e1e1e391944f19487166056c158899a7b40089028234f62e0c7615cc0e41b2fb9a30a66114a1f6fd8e72a625b6e6618e18018fe74226c30d0cac2e8e3e51953634e961854dd1e53bbc6b688e2734ca957db75771096cbe59c702a9f3442ace04abe75e29669cb78ef780684f1693fd849c55a794f7e9535b7097b3a53b7ede35f8a652535fb3e334b63a4e191a03f114399b74cf108b341b158fca1eb53fbec3f099712c75cd633462cc8ce5499e4ad2e81953458af4e58c6e659d5bd284361d05765b95aeae3569d5033e926d1ef8245738d0518af35dbc43b33d2e86ba53ae99d04016449982cdd7f24cf7e53c1ff866397b74a7494b5c079ccd38860e5a8fe30ca81a287b9af31652db18a21c8500902ba9cccf2e85a8b6796c5dda595177dcf5222881f4be1993880cfc283faf95e27ea2602b9fe0eef3ffcc1c4488f933a69672ac444055d41399c8c5ca57b66844a026426a5865354ede37aa6cdff009cb6e04a9928fc527698e081005d4ba7ad8860c7eda717de4c0e9ed3f658f7a1fa3b0ec2e6b7c1ccc8a892c97ffbb2232fee22d2eda1a46bad5c1783429b8f699295bf1ad595fb651da1d1d6761544f5fcb548639c632601149c53e4b9a5b40bdd9aaa99ad898427fbad9821d05751ee7b8229ac81bb38414628c6cdfc7e5a890418e01dff647f88504e5b5dc893fbed085332c8a634866dbe6121d3379b674ff80860f3134ccd554277203189669f7ce94b4c581f88d56b60e37ad7fe83736ce73941965327abee865db57283528752d72f2c9005d0f33a030b19deabfda81e6029a05c51b6e32ef525828f5f2f5d0191a9b6efcce05c1c1b24c25820ecfa998492832bb9284a1d69c544a4c330686a40a557187dd88bed29e7e5a1751b7cf54ab7fe72120d06e0b57660ea325c71e932132982e552e892978b9176ae995f2561b5f677bffc05503263d4f9f68f44e745081cdfb1917b97e53831061923058fa472a7eecd57ec05891b11554df98e0dc13803ea0832cf4b3166e7ebd9be3aa178d0b76fa7cfee83b4eb0a587e2b9fae12bb65e116b2a620e15cf036b1b4802ae69f660a257c77dc9a772f867d2c4885c18d4cb9925195844bac5ced69ccd87fc45f049742f2ef72bb94cc91a9ee15c8d0743e5a4588f36029ba309dde388d60ffeb2080e99dfdd0b937da98326dfd2e71f7e0fac0e66ca398b1f91ae034d84b326c3b6977768f9d8138d65c79f93cf3ac3f2f401ea172c575009b124a6847d63992d7ef37c9ca2515aaa7b8256014db1d24ddf12c001bf620a2382532c1ffac52994dfdc6eab029dc3417ee2c2a0fd37f742a2d1d365f6a4e15de8bc7e59fe1ae3552b5f8adf3f220c5c9415364daa308053a9585e526281417ff17ae459b7838dffafa91da0f87f3c43067e79be16a9f9bb395115c2b9bdfcc6e5cf3fd952233d1d63b771227c3d2b323765bf6aa7cd03ef2f26d4b8d8c68fe6be92c212826207c26ea4326899131d3ce2d34bbbb53f1fe0b96528b44259b8262b900046729e1c0923dc"}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x127081, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r4, 0x541c, &(0x7f0000000140)) fdatasync(r2) 13:45:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0xa, 0x1e, 0xc9, &(0x7f00000003c0)}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0xfb4}}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) 13:45:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000040)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000280)) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x1f, 0x1, 0x6, 0x0, 0x0, 0x7d, 0x910, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x4, @perf_bp={&(0x7f00000003c0), 0x8}, 0x104, 0x9fe3, 0xcde, 0x5, 0xff6, 0x9, 0x520, 0x0, 0xe0, 0x0, 0xf8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x2) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x0) preadv2(r4, &(0x7f0000000240)=[{&(0x7f0000000140)=""/222, 0xde}], 0x1, 0x200, 0xff, 0x1) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x81, 0x4, 0x2, 0x4, 0x0, 0x6, 0x582a0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3a, 0x4, @perf_bp={&(0x7f0000000400), 0x4}, 0x40040, 0x100000001, 0xfffffffb, 0x0, 0x0, 0x1000, 0x7ff, 0x0, 0x4, 0x0, 0x4}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) ioctl$FIOCLEX(r0, 0x5451) ioctl$F2FS_IOC_GARBAGE_COLLECT(r2, 0x4004f506, &(0x7f00000004c0)) 13:45:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6306, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:45:15 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = epoll_create(0x5) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2ccf}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) syz_open_dev$tty1(0xc, 0x4, 0x1) 13:45:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) connect$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x100, @none, 0xfff}, 0xe) shutdown(r0, 0x1) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0xcce, @none, 0x3, 0x1}, 0xe) 13:45:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}], 0x4) 13:45:15 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x0) 13:45:15 executing program 7: syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)={0x1000}) [ 1708.074128] loop2: detected capacity change from 0 to 49 [ 1708.096004] EXT4-fs (loop2): invalid inodes per group: 0 [ 1708.096004] [ 1708.118019] loop2: detected capacity change from 0 to 49 [ 1708.133398] EXT4-fs (loop2): invalid inodes per group: 0 [ 1708.133398] 13:45:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0xbc, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0xfffc}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$AUTOFS_IOC_SETTIMEOUT(r1, 0x80049367, &(0x7f0000000040)) 13:45:15 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x8, 0x0) 13:45:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) syz_open_dev$tty1(0xc, 0x4, 0x1) 13:45:15 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r3, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {}, {0x14, 0x18, {0x0, @bearer=@udp='udp:syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x60000080}, 0x20) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r1, 0x4, 0x70bd2d, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x5}}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x220440a4) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r4, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) 13:45:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:45:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8008, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 1708.330422] loop2: detected capacity change from 0 to 64 [ 1708.355074] EXT4-fs (loop2): invalid inodes per group: 0 [ 1708.355074] 13:45:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r2) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x2, 0x9, &(0x7f0000002500)=[{&(0x7f0000000140)="15db0f618d5ceac6400e3b7524952c30a23bee8393212be71e47dce8b1fb5adf3262d876a4082214e7f15d82d0d5bca7aaf8a0f33cb4c1b25881da8a223833024a71dbcb4fce0e1c32", 0x49, 0xffff}, {&(0x7f00000001c0)="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", 0x1000, 0x9}, {&(0x7f00000011c0)="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", 0xfc, 0x3}, {&(0x7f00000012c0), 0x0, 0x3}, {&(0x7f0000001300)="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", 0x1000, 0x3}, {&(0x7f0000002300)="088b0f267ad4b3782d50f4c4505243c473bce7f7696217b1f2854ca78c247bb5f741ae6d4fc8602cf4ae032f2f7a4019b942ca04184f326cf57078bcaa0bbe1f5772f8ccd9bedfda1d94ab76cf8bfa9c58e6eb1f79dd2f880f4b6386a539bb4ccd36", 0x62, 0xfffffffffffffffd}, {&(0x7f0000002380)="7542739695be196a8df6900ce59453626e191047322c2966c115e454c84440ef9f385f6da056d7428d0a214191c07867d1b777ce4ba8b9b2408933da5d7147e347e59982c8514886ae69aad5f69d54e00932d66a6c0f03500975dd301502f1ef714f7bafcb04105f1e33a5b0536ac8ddb8bb3c11496922c0647345a5035367afede7ff4613018ce2b3f233c27787419c5133ac04384846eaab28ef097d0e4eb70ace34aa1616abe025923b72111032d344d32cc64d7f5b477cad99563d53ebad85c73f54d3710006111de0d159d85629234ff1", 0xd3, 0x5}, {&(0x7f0000002480)="6edc10824e5194c8", 0x8, 0x7}, {&(0x7f00000024c0)="af5876e900bbec38b542c37cae7a7f9723fcc5b904346ea02af7405f8d4105424d0ca91a922b80eca2768183fe2aeabe76d3e4d1e7c5b6", 0x37, 0x9}], 0x8000, &(0x7f0000002600)={[{@uni_xlate}, {@uni_xlate}, {@utf8no}], [{@dont_measure}, {@measure}, {@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x30, 0x37, 0x65, 0x66, 0x62, 0x65, 0x65], 0x2d, [0x37, 0x38, 0x32, 0x62], 0x2d, [0x52, 0x62, 0x38, 0x30], 0x2d, [0x34, 0x32, 0x39, 0x34], 0x2d, [0x63, 0x62, 0x64, 0x33, 0x62, 0x64, 0x37, 0x36]}}}, {@uid_lt={'uid<', r2}}, {@obj_role={'obj_role', 0x3d, '+(b!'}}, {@obj_type={'obj_type', 0x3d, '%-}#,:]/'}}, {@euid_gt={'euid>', 0xee00}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, 0xee01}}]}) 13:45:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}], 0x4) 13:45:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) shutdown(r0, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x800) connect$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0xfffd, @none, 0x400}, 0xe) read(r1, &(0x7f0000000040)=""/102, 0x66) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x521a40, 0x0) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000180)={'caif0\x00', 0x800}) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x7, 0x39, 0x4, 0x1, 0x0, 0x4, 0x80, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x6}, 0xa20a, 0xfffffffffffffffd, 0x6, 0x1, 0x6, 0xc5d, 0x1, 0x0, 0x81, 0x0, 0xff}, 0x0, 0x5, r1, 0xa) 13:45:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8b0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:45:26 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000040)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000280)) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x1f, 0x1, 0x6, 0x0, 0x0, 0x7d, 0x910, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x4, @perf_bp={&(0x7f00000003c0), 0x8}, 0x104, 0x9fe3, 0xcde, 0x5, 0xff6, 0x9, 0x520, 0x0, 0xe0, 0x0, 0xf8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x2) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x0) preadv2(r4, &(0x7f0000000240)=[{&(0x7f0000000140)=""/222, 0xde}], 0x1, 0x200, 0xff, 0x1) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x81, 0x4, 0x2, 0x4, 0x0, 0x6, 0x582a0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3a, 0x4, @perf_bp={&(0x7f0000000400), 0x4}, 0x40040, 0x100000001, 0xfffffffb, 0x0, 0x0, 0x1000, 0x7ff, 0x0, 0x4, 0x0, 0x4}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) ioctl$FIOCLEX(r0, 0x5451) ioctl$F2FS_IOC_GARBAGE_COLLECT(r2, 0x4004f506, &(0x7f00000004c0)) 13:45:26 executing program 7: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/schedstat\x00', 0x0, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, @llc={0x1a, 0x4, 0x1f, 0x4, 0x0, 0x7}, @isdn={0x22, 0x10, 0x3, 0x8, 0x4}, @l2tp={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0xe7, 0x0, 0x0, 0x0, 0x67d0, &(0x7f0000000080)='wg2\x00', 0x9, 0x4, 0x8}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b45, &(0x7f0000000000)={0x1000}) 13:45:26 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000400), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x38, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @remote}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @dev}]}, 0x38}}, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r2, 0x10, 0x70bd26, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2c}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @private=0xa010101}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x23}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x80) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x2c, r5, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x2}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x9}]}, 0x2c}}, 0x8000) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x2c, r5, 0x100, 0x70bc27, 0x25dfdbfb, {{}, {@void, @val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_PID={0x8, 0x52, 0xffffffffffffffff}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x48c0) ioctl$KDGETKEYCODE(r3, 0x4b52, &(0x7f0000000000)={0x1000}) r7 = syz_open_dev$vcsa(&(0x7f0000000440), 0x100, 0x80) sendmsg$NL80211_CMD_RADAR_DETECT(r7, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x30, r5, 0x400, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x4, 0x68}}}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x20000010) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000240), &(0x7f00000003c0)=0x8) 13:45:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000000040)=@expire={0x104, 0x18, 0x1, 0x0, 0x0, {{{@in6=@local, @in6=@private0}, {@in=@empty}, @in=@local}}, [@mark={0xc}]}, 0x104}}, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) [ 1719.093015] loop2: detected capacity change from 0 to 69 [ 1719.111007] EXT4-fs (loop2): invalid inodes per group: 0 [ 1719.111007] [ 1719.137988] loop2: detected capacity change from 0 to 69 13:45:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r0, 0x1) [ 1719.155421] EXT4-fs (loop2): invalid inodes per group: 0 [ 1719.155421] 13:45:26 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)={0x9, 0x8, 0x100000000, 0x5, 0x4f13fa59, 0x3ff}) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) 13:45:26 executing program 7: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x8) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x200000, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/17, 0x11}, {&(0x7f00000000c0)=""/225, 0xe1}], 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b45, &(0x7f0000000000)={0x1000}) 13:45:26 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) 13:45:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:45:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000040)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) [ 1719.324996] loop2: detected capacity change from 0 to 118 [ 1719.342516] EXT4-fs (loop2): invalid inodes per group: 0 [ 1719.342516] 13:45:26 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000000040)=@expire={0x104, 0x18, 0x1, 0x0, 0x0, {{{@in6=@local, @in6=@private0}, {@in=@empty}, @in=@local}}, [@mark={0xc}]}, 0x104}}, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) 13:45:26 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) 13:45:26 executing program 7: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000040)={0x0, 0x486f}) syz_open_dev$tty1(0xc, 0x4, 0x2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0xffe}) [ 1719.696370] mac80211_hwsim hwsim5 wlan1: left promiscuous mode [ 1722.285256] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1722.288166] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1722.291322] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1722.296339] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1722.299502] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 1724.374219] Bluetooth: hci0: command tx timeout [ 1726.421529] Bluetooth: hci0: command tx timeout [ 1728.471199] Bluetooth: hci0: command tx timeout [ 1730.517565] Bluetooth: hci0: command tx timeout [ 1739.218380] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1739.219585] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1739.253582] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1739.254869] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 13:45:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:45:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/cpuinfo\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x34e5, 0x2}]}) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0xfffffffc, 0x9}) 13:45:56 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000cc0), 0x101, 0x0) connect$inet6(r0, &(0x7f0000000d00)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0xd}, 0x6}, 0x1c) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000000280)=[{&(0x7f0000000140)="0348e2c2ac04b2d5572ddd7985a843e6008ca9683cb53c8e2cac86ba509a3129e9fdc14a2f8c4fdd749612b49ebdd996dcabde86", 0x34, 0x6}, {&(0x7f0000000180)="21e258b189723d7eccc64825e509abcd77b811d2f9007c042b2bc475fef84fdb57ec620734f099d14e", 0x29, 0x8}, {&(0x7f00000001c0)="7f16978a2cc95dd4583e9d21e4cf3453a4d3eb4dc574f7aff2ee59805eedb88069acc706075a4754694bc98a27fdb1afd6d2fe8bf0a5302b34e19c1eb540ffb274766c3a206a51ce30e8141e7185efd32baa0ff1b0db9402d8566fae83848980555898c7baecaa8a093533c7172cc6a0b58b4f1e621f7605bc6bca3fd442e2d2f16e3a544176989f8504f04dbb8e3213c2df264e58c433b6e51718975e5070b8883174aee6e0b5fe8d3155e51ce4d05f3c06443742d6", 0xb6, 0x70000}], 0x1a0080, &(0x7f00000007c0)={[{@nodots}, {@fat=@debug}, {@nodots}], [{@obj_type={'obj_type', 0x3d, '+'}}, {@obj_type={'obj_type', 0x3d, ']'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname}, {@smackfsroot={'smackfsroot', 0x3d, '$-'}}]}) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000300)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x9202, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$KDFONTOP_SET_DEF(r2, 0x4b72, &(0x7f0000000040)={0x2, 0x2, 0xb, 0x15, 0xb7, &(0x7f00000003c0)="247730cffca9f58de1d802a49a6300d94f2e54e4103af6a52a7d7c03697debd294e89ae5a0b955f2e8699d9441d2dfa3b465038cae9017b9245184900d4327c986195608326c3f078a07b77bf9526a25ecb2f5c0e9064679e8fcba6381b7507e639b3bf4ce6b0de123229c2ccc580173544d74d3362981795e71151e923a391d0fd3da08eaddc24c6c53a53c7f77b2dc55b3244a8ecbcc8bd79836880b339f45d2e497527bb9bbe8da31bee4e2e5a2480b1f0ccd140557e9816343156e8455999f4ece6abe9fbbea75e98616f0adeb162b7ff179a9714445fccda494ed4f9167c4202c0a27db2e2b91ad6cd648e83b0ea6148203e894ee4b20b515b43b2486fd9ee6ec090e6e42fe12628e41a5fe2f739f39bfc6265b67ea514d5c64a289897a5103d876a41c241037017d4da9724fe8c2eacb7b1e5a21387f2e980fb126cdba41906a463d37f6ef05ad15d1f8f5335a0d1e3a04b151d3cb44f2771d1508a02cf32468668e66be416c07fe6c4b247a5625e1d344096fa413e14dd8a591579ba33c6673431cd5deabe30f9b157b1fbe19cb8aead1c5639b6198b19b7cfa5767d5aff3aa581378580639e4eee5164ea2f355a0ec5307eed81f256dff7193100492e9489e15408cbf7b64d78232fee5a550c13c38124e5fb65465d35c51745784637ce0cf5416f086127a2c9f3b099b972ae1dfe2d303a524be70bec9912d52635d0e6aad5eb6cf508921a4f5dcc33bf1180f5c83df0dd85dc477671a51eb3d82dccb019790dd431f75e10d7bcb190e89da7977db43f9643c3369381aeff4109bc4d996e24cb17c381559b816393e679ca8e888d60c8f663161a5c8234604048357d13dee36ada6deb4a44797118015e2ef5b480878a1850be9bee80b67ea36f60e3ebfc774fd5f618d7c7ee1197871fa4f0840f222d4348f03fc68a0a858a3e9453321921d3d046a25684f2d95ce657c5388a5b3945f5af24103f447709d67cd058e9095babe15d0fc41c299ccca948358df5d1bd53ec2061eec7af6156d3802b5249b4523ef10ac23a70a10dbc82634d916a02a5d1fe37c5eabb1b5ab6fa9e1690e79325e8dbe8efeef2fa2ab77d09b6e7d1a37c1630db9d1ec65b9646019d49166ddc6417ec8c2d3adfd7d0bffd653ad5cbd7a400222891c4286a2691bab764dfaa582021f288fcde0d60f62d8301e42d95b99cae1a0c759cb6e6c515dc4653a8fd591e57bd16444c43409c94433772291900414921491300200ac3a9b0a9033f234bead95c59643ea3b36b4d93a1fb9f90a3ae5ce1f97e1bb148e9340452c3bdf73863059cb2395b01239989d8cfdf6646d26446e10d0af17e06d439e6e917077f00b41fa1d9b5e490160939418bef2e762d59f296328b2491a682a246537bfbf52a137ab1d6de92d878f71352c52ce400e6c0a868b7244d543870a3230fce3"}) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000c80)={0x1, 0x1, 0x1c, 0xe, 0x1e7, &(0x7f0000000880)}) ioctl$KDGETKEYCODE(r2, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {r3}}, './file0\x00'}) ioctl$KDSKBLED(r4, 0x4b65, 0x4) 13:45:56 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x22) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x444a7b6d, 0x1}}, './file0\x00'}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r2, 0x1) 13:45:56 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180), 0x4) 13:45:56 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:45:56 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {0x0}], 0x5) 13:45:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000080)) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000000c0)) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)={0x40000, 0x9}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0x6) [ 1749.511632] loop2: detected capacity change from 0 to 120 13:45:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)}, {&(0x7f0000000080)="5696a74b8759ba9c5da1b92bf9e09231a2d9dbe5248b3fbf19c7f070c00f8edcd2c319b912a36e6f4ea2d3b8eed16cb1027bc1c1b27eddb6842987f45a57e2f1407d3e2c8e0a8a58c8d0964f0add48fe599055d0128fd132dd429fd568075dc8d895fab7104bab5f992828551364c2d8653cfe1df44a3407d0fa0b0854d9c232ed5e1bf5a4eaf68de1cc463a6c4c118881fed57461469a2d6e4efdb1fc687e3c84cfea2b6d20e10990c1c7b4198027c12b02d0f929bb21a36cb443a910b8ff85bff31ef5290d8f40ee7d1a97da403091ca4f73fa7ba0ab99470ee4c5106e3e01819b59eead203b96cfa26807", 0xec}, {&(0x7f0000000180)="d1f78ef9eab7c04d0b49998e51b435bf51a89938d0f10b77643ea097b74b80ae17533f933dc1bb94d3cfa84fbc1ed6396a49173eb2683e456c408944e82211b5b2b73a778e2a2fc7fe6b05105dbc08e872b47a2bba0d2ea7d00348a172b9fca9d2ee6355418b1575dda392a8f914d2659b8803bcc98672fb763e52333992001ebab6a950e964fb23fbf0b80b50458b2e1ebdeb972caf5762de54e4f6aec1adfe7f2e525f3612a5a47c1d5983abed15ffa75ad3cb8fd224972882a2387b10af16f14942613d86dc16f2b29935088b28d4301ffe4e14", 0xd5}, {&(0x7f0000000280)="62df7138af4f9546769c75f61f08beb3206664ae43492d7c666b14d9b21178a47a254a4b5d3ce7c8a9653606226f2fa8178baf418702f221ac717111749b6ca526e11194adcaf8f3596c3cf25b80e5f73379027a31dbfbf08f2cc8151f82d0bb3847d77b4d634465095e17ef9ba0a3ab915fae1dcfb1e0e7e0ec7066692b1991e8951715b72a31cb05e43230e20865da732042132530ede8", 0x98}], 0x4) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) ioctl$KDMKTONE(r0, 0x4b30, 0x6) [ 1749.526416] loop3: detected capacity change from 0 to 1792 13:45:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x22}}, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r1, 0x4b46, &(0x7f0000000000)) 13:45:56 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000040)={0x3d, 0xeb76}) 13:45:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:45:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 1749.568726] EXT4-fs (loop2): invalid inodes per group: 0 [ 1749.568726] [ 1749.581022] loop2: detected capacity change from 0 to 120 [ 1749.604957] EXT4-fs (loop2): invalid inodes per group: 0 [ 1749.604957] [ 1749.703030] loop3: detected capacity change from 0 to 1792 [ 1749.707046] loop2: detected capacity change from 0 to 122 [ 1749.709509] EXT4-fs (loop2): invalid inodes per group: 0 [ 1749.709509] [ 1749.713071] loop2: detected capacity change from 0 to 122 [ 1749.715152] EXT4-fs (loop2): invalid inodes per group: 0 [ 1749.715152] 13:45:56 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) write(r1, &(0x7f0000000100)="cd5d66bbf4fd93aee4e131737362dd5a33340a13bdf18bb1869bab1e35a60aa7c2", 0x21) read(r0, &(0x7f0000000040)=""/102, 0x66) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000040)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r2, 0x4b46, &(0x7f0000000000)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) r4 = epoll_create1(0x80000) io_submit(0x0, 0x5, &(0x7f00000014c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x3, r2, &(0x7f0000000140)="cf7c65bdd517f02615dfab17c62b677fa8371949a3d128558a8f94328d55a4ce33db4b2e3413535ca7d9b7ee9acc562ff1769d988fbcca58ecefbafcee11ed73d7", 0x41, 0x39, 0x0, 0x2, r1}, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x8, 0x2, r1, &(0x7f0000000200)="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", 0x1000, 0x1, 0x0, 0x2, r1}, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x6, r1, &(0x7f0000001240)="90c0989400fe82cf404236f1f4d775d0be0a793a62ff325a6796616d27c749a1e66632c903ad43b89a5d6024ec6d97c20d2899db8c58d206b6ff04682cc38fe643602353c94c204293101230dc90da7ecdee8db6adb913d4b8f5681cd674829dce981dbd0f43e25b09bb06372dc0fb01f3640dc63daaa612acfc87467604a86dfba747d9a596940a6172708a82d3a06fc2e0f80aa4320f006eb30c0e63b2eecbee09cade99a9", 0xa6, 0x5, 0x0, 0x1, r1}, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x2, 0xa433, r3, &(0x7f0000001340)="25f0ea0f3c935d61055c1885ea49dbd5beb5569a75d87ea2cdfcdb138f56e0c9cd96aa275aa031a38e1062e75283e99139baf9a88b42dac6fad8dec49158687c822fd9c194aedbab85c8fc02b66b009a4e6012939d835a8999fa", 0x5a, 0x3, 0x0, 0x0, r0}, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x7, r4, &(0x7f0000001400)="628890f05eeefc072bde321253da1b0e3ebb226394456cb88b381d5e3bfa8538f72120f36c7f1754c59ae976c51e9a0c69ffdd2142e9ba8717cea3285536f23a3449d07e5b1eb980d88c440bcb2346319f18259e58381ec5e52e02571d269ca7a75df6af110402f67df7e295298abe6bc2fc5cde8ceb014f5542119fa202be", 0x7f, 0x9, 0x0, 0x2}]) 13:45:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfeff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 1749.765487] loop2: detected capacity change from 0 to 127 [ 1749.772949] EXT4-fs (loop2): invalid inodes per group: 0 [ 1749.772949] [ 1749.799429] loop2: detected capacity change from 0 to 127 [ 1749.808284] EXT4-fs (loop2): invalid inodes per group: 0 [ 1749.808284] 13:46:05 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x22) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x444a7b6d, 0x1}}, './file0\x00'}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r2, 0x1) 13:46:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="c12a7aadbbaeb669e9f023b2f7278ffdb1", 0x11}, {&(0x7f0000000100)="4ffac6ba587eeb4d998ade698ee4de80373fe1f5e0958207ba2b99faa7b6fd422dd706e5ba4072b6", 0x28}, {&(0x7f0000000140)="736b7fc17ed62bbf1b08de54b6eb24499537b4aa1cd51a298c8160da01f2bf2acbf7ba89c48293b41e13e7c4fcc851864dc5b2bb21d9b9391a41783eaa8a5eb627b83ed1ca7637f6eaee6c1bc31b411f31f8d6cac5b3426fe462410b8de10ec255dc1e7b3f3c0935bb572935635982339ee7bc477f", 0x75}], 0x3, 0x902, 0x9d2) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x721000, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) 13:46:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:46:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x8b2d) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 13:46:05 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x80, 0x4, 0x6, 0x40, 0x8, 0x0, 0x54ef, 0x20010, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x80, 0x4, @perf_config_ext={0x7cf3, 0x6}, 0x20, 0x7, 0x0, 0x1, 0x0, 0x5, 0x4, 0x0, 0x9, 0x0, 0x9f}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x7f, 0x4, 0x85, 0x2e, 0x0, 0xb705, 0x322, 0x9, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, @perf_bp={&(0x7f0000000040), 0xc}, 0x4000, 0x80000000, 0x4, 0x0, 0x2e, 0xfffffffb, 0x1, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, r1, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x4401, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r3, &(0x7f0000000040)=""/102, 0x66) sendfile(r2, r3, &(0x7f00000001c0)=0xffffffff, 0x6) 13:46:05 executing program 3: getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000040)={0x0, 0x1}) 13:46:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {0x0}], 0x5) 13:46:05 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @none, 0x0, 0x2}, 0xe) shutdown(r0, 0x1) 13:46:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) r1 = signalfd4(r0, &(0x7f0000000040)={[0x7]}, 0x8, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000080)={0x6, 0x4}) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCFLSH(r0, 0x540b, 0x0) [ 1758.990619] loop2: detected capacity change from 0 to 127 13:46:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {0x0}], 0x5) [ 1759.026758] EXT4-fs (loop2): invalid inodes per group: 0 [ 1759.026758] 13:46:06 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200800, 0x56) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x2000000) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:46:06 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x1c00000000000, 0x100000001}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r1, 0x1) [ 1759.041024] loop2: detected capacity change from 0 to 127 [ 1759.052720] EXT4-fs (loop2): invalid inodes per group: 0 [ 1759.052720] 13:46:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) creat(&(0x7f0000000100)='./file0\x00', 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x4001, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000040)) 13:46:06 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:46:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:46:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x9}}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) [ 1759.186310] loop2: detected capacity change from 0 to 512 [ 1759.228765] EXT4-fs (loop2): invalid inodes per group: 0 [ 1759.228765] 13:46:15 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:46:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)={0x0, 0x1}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) close(r2) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000040)=0x7) 13:46:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) pwrite64(r0, &(0x7f0000000040)="037347983eb4b78f67154800e13def6757055162e8b97b2d1f7c007a0c9e0e2ba7cbcecc926e15c198e7c7f164f0d03c3ebadd7a78422f3f5a6a7a29dea48447b117199b3dff89187bb148eadd4c62d5c039209832a70fac5f65ef3c6359b73fdc102e415e44622fc823b66e3b9b79715a9d9df0cc27cf506d1fc7c05873d551877dbb56dc95477e62788b1e1f32edcf91b7637a6e097fce43310335973be4a249c7dedff7f717ee5391bc7240569abcc074d62c87c3348758ca80a4f4d2642d71a4d25ad4035ad16a3f7af6fbf90d0cd6837b2e", 0xd4, 0x7) 13:46:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)}], 0x5) 13:46:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x4, 0x5, 0xaa, 0x2, 0x0, 0x6, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x732a, 0x4999c663}, 0x41080, 0x3f, 0xfffffffa, 0x2, 0x5, 0x5, 0x7fff, 0x0, 0x9}, 0x0, 0x7, r0, 0x9) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r1, 0x1) 13:46:15 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {0x0}], 0x5) 13:46:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:46:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x2) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0x3, 0x8001, 0x6}) 13:46:15 executing program 5: chdir(&(0x7f0000000480)='./file0\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000440)={0x1, 0x1, 0x1f, 0x1b, 0x12e, &(0x7f0000000040)}) [ 1768.271863] loop2: detected capacity change from 0 to 1024 [ 1768.289508] EXT4-fs (loop2): invalid inodes per group: 0 [ 1768.289508] [ 1768.301408] loop2: detected capacity change from 0 to 1024 [ 1768.316968] EXT4-fs (loop2): invalid inodes per group: 0 [ 1768.316968] 13:46:15 executing program 7: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x6, 0x80, 0x1, 0x1, 0x7f, 0x65, 0x0, 0x5, 0xb1802, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x0, 0x10000078}, 0x20a0, 0x60, 0x3, 0x1, 0x6a0, 0x8eb0, 0x5, 0x0, 0x1, 0x0, 0x2007}, 0x0, 0x2, 0xffffffffffffffff, 0x3) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pread64(r1, &(0x7f0000000440)=""/153, 0x99, 0x2) ioctl$KDGETKEYCODE(r1, 0x4b45, &(0x7f0000000000)={0x1004, 0x3}) readv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)=""/221, 0xdd}, {&(0x7f0000000180)=""/180, 0xb4}], 0x2) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x45, 0x6, 0x3f, 0x0, 0x0, 0x2, 0x41000, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000280)}, 0x40100, 0x787, 0x3, 0x1, 0x5, 0x7fffffff, 0x8, 0x0, 0x10001}, 0x0, 0xb, r0, 0x8) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x438041, 0x0) ioctl$KDDELIO(r2, 0x4b35, 0x8) 13:46:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r1 = getpid() pidfd_open(r1, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x71) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xff, 0x2, 0x20, 0x81, 0x0, 0x2, 0x12, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x1ef, 0x7}, 0x2000, 0xffff, 0x1, 0x9, 0x7, 0x9, 0xffff, 0x0, 0x5, 0x0, 0xa9}, r1, 0x9, r2, 0x2) 13:46:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:46:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000040)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:46:15 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000040)={0x1, 0x1, 0xe, 0x1d, 0x5d, &(0x7f00000003c0)}) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:46:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:46:15 executing program 3: ioctl$INCFS_IOC_READ_FILE_SIGNATURE(0xffffffffffffffff, 0x8010671f, &(0x7f0000000040)={&(0x7f00000023c0)=""/4100, 0xfffffffffffffd0e}) flock(0xffffffffffffffff, 0xc) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x3) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b52, &(0x7f0000000000)={0x1000}) 13:46:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 1768.513529] loop2: detected capacity change from 0 to 1792 [ 1768.517221] EXT4-fs (loop2): invalid inodes per group: 0 [ 1768.517221] [ 1768.520309] loop2: detected capacity change from 0 to 1792 [ 1768.523543] EXT4-fs (loop2): invalid inodes per group: 0 [ 1768.523543] 13:46:15 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10b00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$VT_ACTIVATE(r1, 0x5606, 0xb6) [ 1768.565999] loop2: detected capacity change from 0 to 2048 [ 1768.569037] EXT4-fs (loop2): invalid inodes per group: 0 [ 1768.569037] 13:46:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:46:25 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x4, 0x5, 0xaa, 0x2, 0x0, 0x6, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x732a, 0x4999c663}, 0x41080, 0x3f, 0xfffffffa, 0x2, 0x5, 0x5, 0x7fff, 0x0, 0x9}, 0x0, 0x7, r0, 0x9) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) shutdown(r1, 0x1) 13:46:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:46:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000044c0)=[{&(0x7f0000004180)="5f22ee7d2339093ecd6e6fc5219fe9cb8b992b459ff64b14a7eeefb26b428984398a56bf06f5cc973593e76910066bcc28a556b7463db30ba7e207903b9e171ae08a849e36572bb76cc4912d878019f76153ece68a4ece11f49dcb6a62d5f7037e1b3beac1f5b6055f7ee60fbfcc4628d2debd03ae8f45c18799e2e8c7a236c96013529c59d194e0a6ac39597ddaadec92d45b878700aacd7fe4f20d288225081f9dc579364eec699a9b31e85ba9e1b463ee4198002cb8fb1675b91d65eb9b294835044a89702cc21b950e4cb96114e866e72425147bf692b5911ea698dd4914ecab943649937df4e55d21a411", 0xed}, {&(0x7f0000004280)="dcb03b017eb6a8d90367f76336c2d76f7c5ca12a133dff1065266421a5e28e82739bfe6585e58ebaed8838cd1315aff9857a04135ca9db36851e6e2518812dd65a848fc6e200707ee3db906f4e7f91d0da6f371df9bafd04698c44dea3781acf13be953bb11819a08d26218b21d94ab8fec42267138a6d7968ed678608bcf7334df4a28c97efbaab6f9b25cbe4ecbb2c29510f2cedc033d87fb3742234bf22e6646cc8b15c078168e43f7b19ee97", 0xae}, {&(0x7f0000004340)="3a13e95864effced47bec96e5482a55efb34d6f1f3fa6b245c562f96bd0a56430d669f7a142e1a34ac0de041d79a84cd827c9591907f0c83e38857e523a8cb84dc9c683888be1df3e9814ff69990eb172f1dec7672652869c1e35a1d", 0x5c}, {&(0x7f00000001c0)="7a3739e6793de0d5c817a9f474f772d0ed6e1209d925ddf4699a24fd1ff0a7b8", 0x20}, {&(0x7f00000043c0)}], 0x5) 13:46:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b52, &(0x7f0000000000)={0x1000}) r1 = getpid() pidfd_open(r1, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x4, 0x0, 0xab, 0x64, 0x0, 0x8, 0x30204, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f0000000040), 0x3}, 0x40a02, 0x1, 0x80, 0x7, 0x2, 0xffffffe0, 0x1, 0x0, 0x1, 0x0, 0xf52e}, r1, 0x2, 0xffffffffffffffff, 0xa) 13:46:25 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000040)={0x40, "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"}) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000280)={0x0, 0x0, 0x1b, 0xd, 0x116, &(0x7f00000003c0)="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"}) 13:46:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x4b46, &(0x7f0000000000)) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="73797a308ced85a64edf9f1b2b9083b00487e1f18ef4ac9ca75e8b8098ec52727dd326015b580cab72c71f3024b74c3d3bfbcbc1f85d25427fb6651a9104bf1e10f468a3d42d9bbae0139ddd3da61ad31013fcb70850db83759a9e8783733deec563ae14af9bd327096900e690de9400000000000000"], 0x76) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000100)) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x5) 13:46:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe0ffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:46:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = epoll_create1(0x0) r2 = getpid() r3 = getpid() r4 = pidfd_open(r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000000000)) r5 = getpid() r6 = pidfd_open(r5, 0x0) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r6, &(0x7f0000000040)={r1, r4, 0x8001}) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x800, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0xee, 0x6, 0x9, 0xa0, 0x0, 0x2, 0x806, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000100), 0x4}, 0xc8, 0x7, 0x7, 0x6, 0xfffffffffffffff7, 0x8, 0x8, 0x0, 0x3, 0x0, 0xffffffffffffff1b}, r2, 0x8, r7, 0x3) connect$bt_l2cap(r0, &(0x7f0000001b00)={0x1f, 0x1, @fixed}, 0xe) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r8, &(0x7f0000000040)=""/102, 0x66) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000080)) shutdown(r0, 0x1) [ 1778.917427] loop2: detected capacity change from 0 to 28799 [ 1778.920287] EXT4-fs (loop2): invalid inodes per group: 0 [ 1778.920287] [ 1778.925909] loop2: detected capacity change from 0 to 28799 [ 1778.929384] EXT4-fs (loop2): invalid inodes per group: 0 [ 1778.929384] 13:46:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf0ffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) [ 1778.982066] loop2: detected capacity change from 0 to 30847 [ 1778.986276] EXT4-fs (loop2): invalid inodes per group: 0 [ 1778.986276] [ 1778.992836] loop2: detected capacity change from 0 to 30847 [ 1778.996678] EXT4-fs (loop2): invalid inodes per group: 0 [ 1778.996678] 13:46:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000021c0000010000000500000000000400004000000000000000f4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012e00)) 13:46:26 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) writev(r1, &(0x7f0000000300)=[{&(0x7f0000000140)="ecfaa14165ed5372fc46e925bbdca7c5d9e7d4a33d16e70700083209af3f155f6c3a09a9da7167dbd8ff36edb7d085b517bad03c8d69149e609fbe03f3573e5dd499045a646287e05572178dda146c86b62a1947a50cb49d61782075cc74823497f2c667bdb76b46beb49d50b2dc0447199059", 0x73}, {&(0x7f00000001c0)="230382b7d3c695ad344bd534b69d7cba5c0189cc2eedd95a90ee73ea82e00c392d921a2b9c698ba870e908c9d24e1f1e1e932572d45d356101cdeb03fbebc48f3bf35e8de85edd42c81da46064f4c231e7fd6e5ec8ebda324c03629df5fb0ec2da745904dba1cda3ad3a77464dbc342541d0f0493f0cb328d6e7c7335a78a97a7a75daffde311ff960dca0bedba099b6f92ef1d033abeeef4ff54f5c6fd7a37a9f0723577cc9f667f8d2577740f3179f92fc3993eec58a3e700c2e24bfe8c5019374fc2dc5bdcf7e9b9196c2ca87fb520e803b13d1", 0xd5}, {&(0x7f00000002c0)="c52ca3988065d16bc1bae208220d5e0735d739e4829c62f9d3d6ac04defe1fd2bbcda3ccd486b060a4648881c8499284737abf63f9a34021d3", 0x39}], 0x3) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) 13:46:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/mei', 0x3851c0, 0x0) read(r1, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) ioctl$KDGETKEYCODE(r0, 0x4b3a, &(0x7f0000000000)) 13:46:26 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000040)={0x80000000, 0x0, 0x1ae, 0x6, 0x15, "fd8e9503d4fe45163213feef0c5a55f54863fa"}) ioctl$KDGETKEYCODE(r0, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x7f5f, 0x1}) [ 1779.111866] loop2: detected capacity change from 0 to 32768 [ 1779.116125] EXT4-fs (loop2): invalid inodes per group: 0 [ 1779.116125] 13:46:26 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/102, 0x66) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r1, 0x720, 0x70bd28, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDDISABIO(r2, 0x4b37) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r2, 0x4b52, &(0x7f0000000000)={0x1000}) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f00000002c0)) r4 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x7, 0x0, 0x1, 0x0, 0x9, 0x45880, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x40, 0x2, @perf_bp={&(0x7f00000000c0), 0x1}, 0x10152, 0xff, 0x6, 0x6, 0x0, 0x0, 0x800, 0x0, 0x400, 0x0, 0x2}, 0x0, 0x0, r3, 0xa) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x9, 0x1, 0x2, 0x67, 0x0, 0xb8, 0x400, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x4, @perf_config_ext={0x100000000001, 0x1}, 0x40, 0x9, 0x4800, 0x6, 0xffffffffffffffe1, 0x3, 0x1000, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x4, r4, 0x3) 13:46:26 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5410, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x1a, 0x0, 0x0}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b45, &(0x7f0000000000)={0x1000}) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0xbc, 0x80000001, 0x400, 0xfff, 0x13, "837a1d28f8bf9cd4d9e24501f6312193d3b2b8"}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000040)=""/102, 0x66) ioctl$TIOCSIG(r2, 0x40045436, 0x1e) [ 1846.676487] Bluetooth: hci0: command 0x0405 tx timeout VM DIAGNOSIS: 13:51:27 Registers: info registers vcpu 0 RAX=0000000000000001 RBX=ffff88801a953118 RCX=ffffffff8150e8e8 RDX=ffffed100352a61a RSI=0000000000000008 RDI=ffff88801a9530c8 RBP=ffff8880188c79e0 RSP=ffff8880188c7920 R8 =0000000000000001 R9 =ffffed100352a619 R10=ffff88801a9530cf R11=0000000000000001 R12=ffff88801a9530c8 R13=ffff88801a953118 R14=0000000000000246 R15=ffffffff84bfbcae RIP=ffffffff8150e8ee RFL=00000086 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fade0ac4700 00000000 00000000 GS =0000 ffff8880e53c6000 00000000 00000000 LDT=0000 fffffe1600000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055ce45344150 CR3=00000000495c5000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=3bec19f176bb134a997aeb030bbf4192 XMM01=2d1157f3bffeb3a05612bb98cef7e13a XMM02=743f8d13acb366543fd4431844b47984 XMM03=83eb6db45abe1f4be1a93f3bcf290158 XMM04=0000000000000000000000002f63b0c3 XMM05=0000000000000000461230043768ba05 XMM06=00000000000000000000000046123004 XMM07=461230043768ba052f63b0c36c6da8b0 XMM08=24000000dc0000002000000042000000 XMM09=00000000000000000000000000000000 XMM10=7b20786d2b75c4a413edfdb92a7b5637 XMM11=8b686737390c5f2196a40af943cb4857 XMM12=0d0c0f0e09080b0a0504070601000302 XMM13=0c0f0e0d080b0a090407060500030201 XMM14=000000000000000000000000000001c0 XMM15=00000000000000000000000000000040 info registers vcpu 1 RAX=0000000000000001 RBX=0000000000000001 RCX=ffffffff84c0c55e RDX=ffffed100352a61b RSI=0000000000000004 RDI=ffff88801a9530d0 RBP=ffff88801a9530d0 RSP=ffff8880495e77d0 R8 =0000000000000000 R9 =ffffed100352a61a R10=ffff88801a9530d3 R11=0000000000000001 R12=1ffff110092bcefb R13=0000000000000003 R14=ffffed100352a61a R15=ffff8880495e7808 RIP=ffffffff84c0c6f0 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fade0b06700 00000000 00000000 GS =0000 ffff8880e54c6000 00000000 00000000 LDT=0000 fffffe4900000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055ce45371ae8 CR3=00000000495c5000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000006000000030000000200000000 XMM02=006e65672063657865080a0100010101 XMM03=0a00657a696d696e696d20636578650d XMM04=6365786511006873616d732063657865 XMM05=650900737472617473657220726f7475 XMM06=6320636578650e007a7a756620636578 XMM07=7420636578650b006574616469646e61 XMM08=6d696e696d20636578650d006e656720 XMM09=006873616d7320636578650a00657a69 XMM10=72617473657220726f74756365786511 XMM11=650e007a7a7566206365786509007374 XMM12=650b006574616469646e616320636578 XMM13=636578650a0065676169727420636578 XMM14=65657320636578650a0073746e696820 XMM15=00006c61746f7420636578650a007364