Warning: Permanently added '[localhost]:10361' (ECDSA) to the list of known hosts. 2022/10/05 11:05:56 fuzzer started 2022/10/05 11:05:56 dialing manager at localhost:37193 syzkaller login: [ 43.865829] cgroup: Unknown subsys name 'net' [ 44.012687] cgroup: Unknown subsys name 'rlimit' 2022/10/05 11:06:11 syscalls: 2215 2022/10/05 11:06:11 code coverage: enabled 2022/10/05 11:06:11 comparison tracing: enabled 2022/10/05 11:06:11 extra coverage: enabled 2022/10/05 11:06:11 setuid sandbox: enabled 2022/10/05 11:06:11 namespace sandbox: enabled 2022/10/05 11:06:11 Android sandbox: enabled 2022/10/05 11:06:11 fault injection: enabled 2022/10/05 11:06:11 leak checking: enabled 2022/10/05 11:06:11 net packet injection: enabled 2022/10/05 11:06:11 net device setup: enabled 2022/10/05 11:06:11 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/05 11:06:11 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/05 11:06:11 USB emulation: enabled 2022/10/05 11:06:11 hci packet injection: enabled 2022/10/05 11:06:11 wifi device emulation: failed to parse kernel version (6.0.0-next-20221005) 2022/10/05 11:06:11 802.15.4 emulation: enabled 2022/10/05 11:06:11 fetching corpus: 0, signal 0/2000 (executing program) 2022/10/05 11:06:11 fetching corpus: 50, signal 29884/32715 (executing program) 2022/10/05 11:06:11 fetching corpus: 100, signal 36411/40326 (executing program) 2022/10/05 11:06:12 fetching corpus: 150, signal 43932/48591 (executing program) 2022/10/05 11:06:12 fetching corpus: 200, signal 48027/53446 (executing program) 2022/10/05 11:06:12 fetching corpus: 250, signal 54293/59996 (executing program) 2022/10/05 11:06:12 fetching corpus: 300, signal 59013/65041 (executing program) 2022/10/05 11:06:12 fetching corpus: 350, signal 62460/68838 (executing program) 2022/10/05 11:06:12 fetching corpus: 400, signal 65109/71860 (executing program) 2022/10/05 11:06:12 fetching corpus: 450, signal 68692/75491 (executing program) 2022/10/05 11:06:12 fetching corpus: 500, signal 72004/78804 (executing program) 2022/10/05 11:06:13 fetching corpus: 550, signal 75397/82055 (executing program) 2022/10/05 11:06:13 fetching corpus: 600, signal 78194/84700 (executing program) 2022/10/05 11:06:13 fetching corpus: 650, signal 79626/86243 (executing program) 2022/10/05 11:06:13 fetching corpus: 700, signal 80983/87650 (executing program) 2022/10/05 11:06:13 fetching corpus: 750, signal 83438/89820 (executing program) 2022/10/05 11:06:13 fetching corpus: 800, signal 85366/91462 (executing program) 2022/10/05 11:06:13 fetching corpus: 850, signal 87274/93103 (executing program) 2022/10/05 11:06:13 fetching corpus: 900, signal 89336/94718 (executing program) 2022/10/05 11:06:14 fetching corpus: 950, signal 90855/95939 (executing program) 2022/10/05 11:06:14 fetching corpus: 1000, signal 92766/97336 (executing program) 2022/10/05 11:06:14 fetching corpus: 1050, signal 94462/98478 (executing program) 2022/10/05 11:06:14 fetching corpus: 1100, signal 97183/100202 (executing program) 2022/10/05 11:06:14 fetching corpus: 1150, signal 98811/101196 (executing program) 2022/10/05 11:06:14 fetching corpus: 1200, signal 99839/101879 (executing program) 2022/10/05 11:06:14 fetching corpus: 1236, signal 101520/102808 (executing program) 2022/10/05 11:06:14 fetching corpus: 1236, signal 101520/102862 (executing program) 2022/10/05 11:06:14 fetching corpus: 1236, signal 101520/102911 (executing program) 2022/10/05 11:06:14 fetching corpus: 1236, signal 101520/102966 (executing program) 2022/10/05 11:06:14 fetching corpus: 1236, signal 101520/103018 (executing program) 2022/10/05 11:06:14 fetching corpus: 1236, signal 101520/103066 (executing program) 2022/10/05 11:06:14 fetching corpus: 1236, signal 101520/103115 (executing program) 2022/10/05 11:06:14 fetching corpus: 1236, signal 101520/103162 (executing program) 2022/10/05 11:06:14 fetching corpus: 1236, signal 101520/103209 (executing program) 2022/10/05 11:06:14 fetching corpus: 1236, signal 101520/103265 (executing program) 2022/10/05 11:06:14 fetching corpus: 1236, signal 101520/103320 (executing program) 2022/10/05 11:06:14 fetching corpus: 1236, signal 101520/103377 (executing program) 2022/10/05 11:06:14 fetching corpus: 1236, signal 101520/103430 (executing program) 2022/10/05 11:06:14 fetching corpus: 1236, signal 101520/103481 (executing program) 2022/10/05 11:06:15 fetching corpus: 1236, signal 101520/103521 (executing program) 2022/10/05 11:06:15 fetching corpus: 1236, signal 101520/103567 (executing program) 2022/10/05 11:06:15 fetching corpus: 1236, signal 101520/103612 (executing program) 2022/10/05 11:06:15 fetching corpus: 1236, signal 101520/103661 (executing program) 2022/10/05 11:06:15 fetching corpus: 1236, signal 101520/103719 (executing program) 2022/10/05 11:06:15 fetching corpus: 1236, signal 101520/103772 (executing program) 2022/10/05 11:06:15 fetching corpus: 1236, signal 101520/103814 (executing program) 2022/10/05 11:06:15 fetching corpus: 1236, signal 101520/103866 (executing program) 2022/10/05 11:06:15 fetching corpus: 1236, signal 101520/103905 (executing program) 2022/10/05 11:06:15 fetching corpus: 1236, signal 101520/103948 (executing program) 2022/10/05 11:06:15 fetching corpus: 1236, signal 101520/103995 (executing program) 2022/10/05 11:06:15 fetching corpus: 1236, signal 101520/104039 (executing program) 2022/10/05 11:06:15 fetching corpus: 1236, signal 101520/104094 (executing program) 2022/10/05 11:06:15 fetching corpus: 1236, signal 101520/104094 (executing program) 2022/10/05 11:06:17 starting 8 fuzzer processes 11:06:17 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000140)=@known='trusted.overlay.opaque\x00', &(0x7f0000000180)=""/180, 0xb4) 11:06:17 executing program 2: r0 = io_uring_setup(0x2be0, &(0x7f0000000a00)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 11:06:17 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, &(0x7f000000c440)) [ 64.716955] audit: type=1400 audit(1664967977.497:6): avc: denied { execmem } for pid=283 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 11:06:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10, 0x0}}], 0x1, 0x0) 11:06:17 executing program 4: ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000280)) socketpair(0x0, 0x0, 0x0, &(0x7f0000001580)) io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)={&(0x7f0000001800)={[0x100000001]}, 0x8}) 11:06:17 executing program 5: pipe2$9p(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 11:06:17 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0x3, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 11:06:17 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000980)=@gcm_128={{}, "41181d751d037a13", "f1d4f037e601488af0dbc3934a3f17bb", "3137a10d", "0a3e7fcfd743a8cb"}, 0x28) [ 65.990517] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 65.994702] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 65.996093] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 66.006677] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 66.010763] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 66.012539] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 66.017509] Bluetooth: hci0: HCI_REQ-0x0c1a [ 66.037394] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 66.052991] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 66.054456] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 66.057346] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 66.058769] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 66.060095] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 66.064172] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 66.065714] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 66.067035] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 66.068502] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 66.074352] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 66.076527] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 66.084879] Bluetooth: hci1: HCI_REQ-0x0c1a [ 66.087340] Bluetooth: hci2: HCI_REQ-0x0c1a [ 66.120685] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 66.122589] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 66.124933] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 66.128755] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 66.137346] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 66.138572] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 66.148220] Bluetooth: hci3: HCI_REQ-0x0c1a [ 66.156666] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 66.158520] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 66.169682] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 66.171592] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 66.173877] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 66.176051] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 66.178082] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 66.181560] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 66.182790] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 66.184103] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 66.197488] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 66.204633] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 66.209957] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 66.210963] Bluetooth: hci4: HCI_REQ-0x0c1a [ 66.215954] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 66.218634] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 66.230417] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 66.231662] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 66.233762] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 66.236381] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 66.248565] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 66.249624] Bluetooth: hci5: HCI_REQ-0x0c1a [ 66.267060] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 66.271384] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 66.273045] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 66.276030] Bluetooth: hci6: HCI_REQ-0x0c1a [ 66.282484] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 66.303904] Bluetooth: hci7: HCI_REQ-0x0c1a [ 68.080450] Bluetooth: hci0: command 0x0409 tx timeout [ 68.143211] Bluetooth: hci2: command 0x0409 tx timeout [ 68.143744] Bluetooth: hci1: command 0x0409 tx timeout [ 68.208241] Bluetooth: hci3: command 0x0409 tx timeout [ 68.271208] Bluetooth: hci5: command 0x0409 tx timeout [ 68.271829] Bluetooth: hci4: command 0x0409 tx timeout [ 68.335236] Bluetooth: hci6: command 0x0409 tx timeout [ 68.335850] Bluetooth: hci7: command 0x0409 tx timeout [ 70.127497] Bluetooth: hci0: command 0x041b tx timeout [ 70.191228] Bluetooth: hci1: command 0x041b tx timeout [ 70.191655] Bluetooth: hci2: command 0x041b tx timeout [ 70.255225] Bluetooth: hci3: command 0x041b tx timeout [ 70.319252] Bluetooth: hci4: command 0x041b tx timeout [ 70.319671] Bluetooth: hci5: command 0x041b tx timeout [ 70.383189] Bluetooth: hci7: command 0x041b tx timeout [ 70.383599] Bluetooth: hci6: command 0x041b tx timeout [ 72.175163] Bluetooth: hci0: command 0x040f tx timeout [ 72.239176] Bluetooth: hci2: command 0x040f tx timeout [ 72.239601] Bluetooth: hci1: command 0x040f tx timeout [ 72.303244] Bluetooth: hci3: command 0x040f tx timeout [ 72.367174] Bluetooth: hci5: command 0x040f tx timeout [ 72.367684] Bluetooth: hci4: command 0x040f tx timeout [ 72.431181] Bluetooth: hci6: command 0x040f tx timeout [ 72.431694] Bluetooth: hci7: command 0x040f tx timeout [ 74.223166] Bluetooth: hci0: command 0x0419 tx timeout [ 74.287230] Bluetooth: hci1: command 0x0419 tx timeout [ 74.287670] Bluetooth: hci2: command 0x0419 tx timeout [ 74.351155] Bluetooth: hci3: command 0x0419 tx timeout [ 74.415217] Bluetooth: hci4: command 0x0419 tx timeout [ 74.415662] Bluetooth: hci5: command 0x0419 tx timeout [ 74.479215] Bluetooth: hci7: command 0x0419 tx timeout [ 74.479678] Bluetooth: hci6: command 0x0419 tx timeout 11:07:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, &(0x7f000000c440)) 11:07:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, &(0x7f000000c440)) 11:07:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, &(0x7f000000c440)) 11:07:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) setfsgid(0x0) 11:07:14 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) setfsgid(0x0) 11:07:14 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) setfsgid(0x0) 11:07:16 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000980)=@gcm_128={{}, "41181d751d037a13", "f1d4f037e601488af0dbc3934a3f17bb", "3137a10d", "0a3e7fcfd743a8cb"}, 0x28) 11:07:16 executing program 5: pipe2$9p(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 11:07:16 executing program 4: pipe2$9p(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 11:07:16 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0x3, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 11:07:16 executing program 2: r0 = io_uring_setup(0x2be0, &(0x7f0000000a00)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 11:07:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) setfsgid(0x0) 11:07:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10, 0x0}}], 0x1, 0x0) 11:07:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000140)=@known='trusted.overlay.opaque\x00', &(0x7f0000000180)=""/180, 0xb4) 11:07:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10, 0x0}}], 0x1, 0x0) 11:07:16 executing program 2: r0 = io_uring_setup(0x2be0, &(0x7f0000000a00)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 11:07:16 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0x3, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 11:07:16 executing program 5: pipe2$9p(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 11:07:16 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000980)=@gcm_128={{}, "41181d751d037a13", "f1d4f037e601488af0dbc3934a3f17bb", "3137a10d", "0a3e7fcfd743a8cb"}, 0x28) 11:07:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000140)=@known='trusted.overlay.opaque\x00', &(0x7f0000000180)=""/180, 0xb4) 11:07:16 executing program 4: pipe2$9p(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 11:07:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10, 0x0}}], 0x1, 0x0) 11:07:16 executing program 5: pipe2$9p(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 11:07:16 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0x3, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 11:07:16 executing program 2: r0 = io_uring_setup(0x2be0, &(0x7f0000000a00)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 11:07:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) getxattr(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000140)=@known='trusted.overlay.opaque\x00', &(0x7f0000000180)=""/180, 0xb4) 11:07:16 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000980)=@gcm_128={{}, "41181d751d037a13", "f1d4f037e601488af0dbc3934a3f17bb", "3137a10d", "0a3e7fcfd743a8cb"}, 0x28) 11:07:16 executing program 4: pipe2$9p(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 11:07:16 executing program 1: semtimedop(0x0, &(0x7f0000000b40)=[{}], 0x1, 0x0) 11:07:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r1 = socket(0x11, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) bind$packet(r1, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000150000000c00018008000300000000002800018014000200626f6e645f736c6176655f3000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) 11:07:16 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, 0x0, 0x0) 11:07:16 executing program 5: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write(r0, &(0x7f00000000c0)="8c1e819b00", 0x5) 11:07:16 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getgroups(0x2, &(0x7f0000000840)=[0x0, 0xee01]) fchown(r0, 0xffffffffffffffff, r1) 11:07:16 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) [ 123.688496] audit: type=1400 audit(1664968036.469:7): avc: denied { open } for pid=4008 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 123.690515] audit: type=1400 audit(1664968036.469:8): avc: denied { kernel } for pid=4008 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 123.705001] ------------[ cut here ]------------ [ 123.705025] [ 123.705029] ====================================================== [ 123.705033] WARNING: possible circular locking dependency detected [ 123.705037] 6.0.0-next-20221005 #1 Not tainted [ 123.705043] ------------------------------------------------------ [ 123.705047] syz-executor.7/4011 is trying to acquire lock: [ 123.705053] ffffffff853faaf8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 123.705094] [ 123.705094] but task is already holding lock: [ 123.705097] ffff88800e618c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 123.705127] [ 123.705127] which lock already depends on the new lock. [ 123.705127] [ 123.705130] [ 123.705130] the existing dependency chain (in reverse order) is: [ 123.705133] [ 123.705133] -> #3 (&ctx->lock){....}-{2:2}: [ 123.705147] _raw_spin_lock+0x2a/0x40 [ 123.705160] __perf_event_task_sched_out+0x53b/0x18d0 [ 123.705171] __schedule+0xedd/0x2470 [ 123.705186] schedule+0xda/0x1b0 [ 123.705200] exit_to_user_mode_prepare+0x114/0x1a0 [ 123.705213] syscall_exit_to_user_mode+0x19/0x40 [ 123.705227] do_syscall_64+0x48/0x90 [ 123.705237] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.705250] [ 123.705250] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 123.705264] _raw_spin_lock_nested+0x30/0x40 [ 123.705275] raw_spin_rq_lock_nested+0x1e/0x30 [ 123.705289] task_fork_fair+0x63/0x4d0 [ 123.705306] sched_cgroup_fork+0x3d0/0x540 [ 123.705320] copy_process+0x4183/0x6e20 [ 123.705332] kernel_clone+0xe7/0x890 [ 123.705341] user_mode_thread+0xad/0xf0 [ 123.705352] rest_init+0x24/0x250 [ 123.705364] arch_call_rest_init+0xf/0x14 [ 123.705384] start_kernel+0x4c6/0x4eb [ 123.705401] secondary_startup_64_no_verify+0xe0/0xeb [ 123.705415] [ 123.705415] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 123.705428] _raw_spin_lock_irqsave+0x39/0x60 [ 123.705440] try_to_wake_up+0xab/0x1930 [ 123.705453] up+0x75/0xb0 [ 123.705468] __up_console_sem+0x6e/0x80 [ 123.705484] console_unlock+0x46a/0x590 [ 123.705500] vt_ioctl+0x2822/0x2ca0 [ 123.705513] tty_ioctl+0x785/0x16b0 [ 123.705524] __x64_sys_ioctl+0x19a/0x210 [ 123.705539] do_syscall_64+0x3b/0x90 [ 123.705548] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.705561] [ 123.705561] -> #0 ((console_sem).lock){....}-{2:2}: [ 123.705575] __lock_acquire+0x2a02/0x5e70 [ 123.705592] lock_acquire+0x1a2/0x530 [ 123.705608] _raw_spin_lock_irqsave+0x39/0x60 [ 123.705619] down_trylock+0xe/0x70 [ 123.705634] __down_trylock_console_sem+0x3b/0xd0 [ 123.705651] vprintk_emit+0x16b/0x560 [ 123.705666] vprintk+0x84/0xa0 [ 123.705682] _printk+0xba/0xf1 [ 123.705695] report_bug.cold+0x72/0xab [ 123.705712] handle_bug+0x3c/0x70 [ 123.705721] exc_invalid_op+0x14/0x50 [ 123.705731] asm_exc_invalid_op+0x16/0x20 [ 123.705744] group_sched_out.part.0+0x2c7/0x460 [ 123.705761] ctx_sched_out+0x8f1/0xc10 [ 123.705778] __perf_event_task_sched_out+0x6d0/0x18d0 [ 123.705789] __schedule+0xedd/0x2470 [ 123.705803] schedule+0xda/0x1b0 [ 123.705817] exit_to_user_mode_prepare+0x114/0x1a0 [ 123.705828] syscall_exit_to_user_mode+0x19/0x40 [ 123.705841] do_syscall_64+0x48/0x90 [ 123.705850] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.705864] [ 123.705864] other info that might help us debug this: [ 123.705864] [ 123.705866] Chain exists of: [ 123.705866] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 123.705866] [ 123.705881] Possible unsafe locking scenario: [ 123.705881] [ 123.705884] CPU0 CPU1 [ 123.705886] ---- ---- [ 123.705888] lock(&ctx->lock); [ 123.705894] lock(&rq->__lock); [ 123.705900] lock(&ctx->lock); [ 123.705906] lock((console_sem).lock); [ 123.705912] [ 123.705912] *** DEADLOCK *** [ 123.705912] [ 123.705914] 2 locks held by syz-executor.7/4011: [ 123.705921] #0: ffff88806ce37e98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 123.705951] #1: ffff88800e618c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 123.705977] [ 123.705977] stack backtrace: [ 123.705980] CPU: 0 PID: 4011 Comm: syz-executor.7 Not tainted 6.0.0-next-20221005 #1 [ 123.705993] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 123.706000] Call Trace: [ 123.706003] [ 123.706007] dump_stack_lvl+0x8b/0xb3 [ 123.706027] check_noncircular+0x263/0x2e0 [ 123.706044] ? format_decode+0x26c/0xb50 [ 123.706061] ? print_circular_bug+0x450/0x450 [ 123.706079] ? simple_strtoul+0x30/0x30 [ 123.706096] ? format_decode+0x26c/0xb50 [ 123.706114] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 123.706132] __lock_acquire+0x2a02/0x5e70 [ 123.706154] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 123.706176] lock_acquire+0x1a2/0x530 [ 123.706193] ? down_trylock+0xe/0x70 [ 123.706211] ? lock_release+0x750/0x750 [ 123.706232] ? vprintk+0x84/0xa0 [ 123.706250] _raw_spin_lock_irqsave+0x39/0x60 [ 123.706263] ? down_trylock+0xe/0x70 [ 123.706287] down_trylock+0xe/0x70 [ 123.706304] ? vprintk+0x84/0xa0 [ 123.706322] __down_trylock_console_sem+0x3b/0xd0 [ 123.706339] vprintk_emit+0x16b/0x560 [ 123.706359] vprintk+0x84/0xa0 [ 123.706376] _printk+0xba/0xf1 [ 123.706388] ? record_print_text.cold+0x16/0x16 [ 123.706405] ? report_bug.cold+0x66/0xab [ 123.706424] ? group_sched_out.part.0+0x2c7/0x460 [ 123.706443] report_bug.cold+0x72/0xab [ 123.706463] handle_bug+0x3c/0x70 [ 123.706473] exc_invalid_op+0x14/0x50 [ 123.706483] asm_exc_invalid_op+0x16/0x20 [ 123.706497] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 123.706519] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 123.706530] RSP: 0018:ffff88803fb27c48 EFLAGS: 00010006 [ 123.706539] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 123.706547] RDX: ffff88803fad9ac0 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 123.706555] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 123.706562] R10: 0000000000000000 R11: ffffffff865b601b R12: ffff88800e618c00 [ 123.706570] R13: ffff88806ce3d2c0 R14: ffffffff8547d040 R15: 0000000000000002 [ 123.706581] ? group_sched_out.part.0+0x2c7/0x460 [ 123.706601] ? group_sched_out.part.0+0x2c7/0x460 [ 123.706620] ctx_sched_out+0x8f1/0xc10 [ 123.706640] __perf_event_task_sched_out+0x6d0/0x18d0 [ 123.706654] ? lock_is_held_type+0xd7/0x130 [ 123.706668] ? __perf_cgroup_move+0x160/0x160 [ 123.706679] ? set_next_entity+0x304/0x550 [ 123.706696] ? update_curr+0x267/0x740 [ 123.706714] ? lock_is_held_type+0xd7/0x130 [ 123.706729] __schedule+0xedd/0x2470 [ 123.706747] ? io_schedule_timeout+0x150/0x150 [ 123.706764] ? rcu_read_lock_sched_held+0x3e/0x80 [ 123.706785] schedule+0xda/0x1b0 [ 123.706800] exit_to_user_mode_prepare+0x114/0x1a0 [ 123.706812] syscall_exit_to_user_mode+0x19/0x40 [ 123.706827] do_syscall_64+0x48/0x90 [ 123.706837] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.706851] RIP: 0033:0x7fdc84c94b19 [ 123.706859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 123.706870] RSP: 002b:00007fdc8220a218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 123.706880] RAX: 0000000000000001 RBX: 00007fdc84da7f68 RCX: 00007fdc84c94b19 [ 123.706888] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fdc84da7f6c [ 123.706895] RBP: 00007fdc84da7f60 R08: 000000000000000e R09: 0000000000000000 [ 123.706902] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fdc84da7f6c [ 123.706909] R13: 00007ffd9db95dcf R14: 00007fdc8220a300 R15: 0000000000022000 [ 123.706922] [ 123.761141] WARNING: CPU: 0 PID: 4011 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 123.761781] Modules linked in: [ 123.762004] CPU: 0 PID: 4011 Comm: syz-executor.7 Not tainted 6.0.0-next-20221005 #1 [ 123.762562] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 123.763139] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 123.763530] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 123.764795] RSP: 0018:ffff88803fb27c48 EFLAGS: 00010006 [ 123.765179] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 123.765679] RDX: ffff88803fad9ac0 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 123.766181] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 123.766678] R10: 0000000000000000 R11: ffffffff865b601b R12: ffff88800e618c00 [ 123.767180] R13: ffff88806ce3d2c0 R14: ffffffff8547d040 R15: 0000000000000002 [ 123.767686] FS: 00007fdc8220a700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 123.768256] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 123.768674] CR2: 0000000000000000 CR3: 000000003e4ae000 CR4: 0000000000350ef0 [ 123.769188] Call Trace: [ 123.769369] [ 123.769538] ctx_sched_out+0x8f1/0xc10 [ 123.769821] __perf_event_task_sched_out+0x6d0/0x18d0 [ 123.770202] ? lock_is_held_type+0xd7/0x130 [ 123.770533] ? __perf_cgroup_move+0x160/0x160 [ 123.770859] ? set_next_entity+0x304/0x550 [ 123.771175] ? update_curr+0x267/0x740 [ 123.771465] ? lock_is_held_type+0xd7/0x130 [ 123.771779] __schedule+0xedd/0x2470 [ 123.772064] ? io_schedule_timeout+0x150/0x150 [ 123.772396] ? rcu_read_lock_sched_held+0x3e/0x80 [ 123.772745] schedule+0xda/0x1b0 [ 123.773021] exit_to_user_mode_prepare+0x114/0x1a0 [ 123.773380] syscall_exit_to_user_mode+0x19/0x40 [ 123.773699] do_syscall_64+0x48/0x90 [ 123.773951] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.774305] RIP: 0033:0x7fdc84c94b19 [ 123.774552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 123.775723] RSP: 002b:00007fdc8220a218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 123.776214] RAX: 0000000000000001 RBX: 00007fdc84da7f68 RCX: 00007fdc84c94b19 [ 123.776676] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fdc84da7f6c [ 123.777138] RBP: 00007fdc84da7f60 R08: 000000000000000e R09: 0000000000000000 [ 123.777599] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fdc84da7f6c [ 123.778065] R13: 00007ffd9db95dcf R14: 00007fdc8220a300 R15: 0000000000022000 [ 123.778536] [ 123.778695] irq event stamp: 746 [ 123.778915] hardirqs last enabled at (745): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 123.779514] hardirqs last disabled at (746): [] __schedule+0x1225/0x2470 [ 123.780052] softirqs last enabled at (484): [] __irq_exit_rcu+0x11b/0x180 [ 123.780598] softirqs last disabled at (421): [] __irq_exit_rcu+0x11b/0x180 [ 123.781155] ---[ end trace 0000000000000000 ]--- 11:07:16 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1a, 0x2000) close_range(r0, 0xffffffffffffffff, 0x0) 11:07:16 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000001a40)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e7d, 0x31ce, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 11:07:16 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getgroups(0x2, &(0x7f0000000840)=[0x0, 0xee01]) fchown(r0, 0xffffffffffffffff, r1) [ 123.842015] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 123.843912] misc raw-gadget: fail, usb_gadget_register_driver returned -16 11:07:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 11:07:16 executing program 4: futex(0x0, 0xc, 0xffffffff, 0x0, 0x0, 0x0) 11:07:16 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1a, 0x2000) close_range(r0, 0xffffffffffffffff, 0x0) 11:07:16 executing program 4: futex(0x0, 0xc, 0xffffffff, 0x0, 0x0, 0x0) 11:07:16 executing program 5: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write(r0, &(0x7f00000000c0)="8c1e819b00", 0x5) 11:07:16 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getgroups(0x2, &(0x7f0000000840)=[0x0, 0xee01]) fchown(r0, 0xffffffffffffffff, r1) 11:07:16 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getgroups(0x2, &(0x7f0000000840)=[0x0, 0xee01]) fchown(r0, 0xffffffffffffffff, r1) 11:07:16 executing program 5: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write(r0, &(0x7f00000000c0)="8c1e819b00", 0x5) [ 124.347377] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 124.348087] misc raw-gadget: fail, usb_gadget_register_driver returned -16 11:07:17 executing program 4: futex(0x0, 0xc, 0xffffffff, 0x0, 0x0, 0x0) 11:07:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r1 = socket(0x11, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) bind$packet(r1, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000150000000c00018008000300000000002800018014000200626f6e645f736c6176655f3000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) 11:07:17 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000001a40)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e7d, 0x31ce, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 11:07:17 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:17 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 11:07:17 executing program 5: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write(r0, &(0x7f00000000c0)="8c1e819b00", 0x5) 11:07:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 11:07:17 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1a, 0x2000) close_range(r0, 0xffffffffffffffff, 0x0) [ 124.420123] hrtimer: interrupt took 19447 ns [ 124.420674] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 124.423716] misc raw-gadget: fail, usb_gadget_register_driver returned -16 11:07:17 executing program 4: futex(0x0, 0xc, 0xffffffff, 0x0, 0x0, 0x0) [ 124.483596] blktrace: Concurrent blktraces are not allowed on sg0 11:07:17 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1a, 0x2000) close_range(r0, 0xffffffffffffffff, 0x0) 11:07:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r1 = socket(0x11, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) bind$packet(r1, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000150000000c00018008000300000000002800018014000200626f6e645f736c6176655f3000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="09f9dc8fa58b8e8d344b0fecf974b24329f2db179e0b346e2cbd147dcf14b6f68f84b4d2698b57f46ce6ef3d84ad2bfdfb8d082e7f28b2a5be750e5613e88738e48d250453795f067ae0677eb51ba0a3462f648aa7845a69be46184ded4b2d20000453e89e3f7c92e7b32c7b626578f7f8420c6a984a11007489dd632cabe32a601f310bdd7a2c5fb28778c0d2b3e450d4eddafc876b9a566454000000000100000071d634fe630ccb174dcf2582a5e27ec93e695727f222c38bbcde31b98ea1acc1a0ace9dd73f9621a3a7f86b401bb8bc20c594343f179b91f3c47dfa857fcb1160972a5f8b489a5a563e158299b82add486a8cffdd09c427882af330a5966cefa20189c1f336d94f0cfb134afa6f3d3e86286bd17d1d659dbadce0bde7903d438c48e2db9b097dfe493042360676f71b204bd2cd85c53f82ca25958c8af0000"], 0x48}}, 0x0) 11:07:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 11:07:17 executing program 5: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:17 executing program 4: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:17 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:17 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) [ 124.698372] blktrace: Concurrent blktraces are not allowed on sg0 11:07:17 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) [ 124.765021] blktrace: Concurrent blktraces are not allowed on sg0 [ 124.816700] blktrace: Concurrent blktraces are not allowed on sg0 [ 124.906984] blktrace: Concurrent blktraces are not allowed on sg0 11:07:17 executing program 4: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r1 = socket(0x11, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) bind$packet(r1, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000150000000c00018008000300000000002800018014000200626f6e645f736c6176655f3000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) 11:07:17 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000001a40)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e7d, 0x31ce, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 11:07:17 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) [ 125.025067] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 125.029514] misc raw-gadget: fail, usb_gadget_register_driver returned -16 11:07:17 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) [ 125.132495] blktrace: Concurrent blktraces are not allowed on sg0 [ 125.381021] blktrace: Concurrent blktraces are not allowed on sg0 11:07:20 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'security.', '/dev/ptp0\x00'}, &(0x7f0000000400)='/dev/ptp0\x00', 0xa, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 11:07:20 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:20 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000001a40)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e7d, 0x31ce, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 11:07:20 executing program 4: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:20 executing program 6: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:20 executing program 7: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:20 executing program 5: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:20 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) [ 127.769904] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 127.770759] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 127.799612] blktrace: Concurrent blktraces are not allowed on sg0 [ 127.801050] blktrace: Concurrent blktraces are not allowed on sg0 [ 127.809338] blktrace: Concurrent blktraces are not allowed on sg0 [ 127.810691] blktrace: Concurrent blktraces are not allowed on sg0 [ 127.821410] blktrace: Concurrent blktraces are not allowed on sg0 [ 127.858876] blktrace: Concurrent blktraces are not allowed on sg0 11:07:20 executing program 6: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:20 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) [ 127.968558] blktrace: Concurrent blktraces are not allowed on sg0 [ 127.977474] blktrace: Concurrent blktraces are not allowed on sg0 11:07:21 executing program 7: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:21 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:21 executing program 5: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:21 executing program 4: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:21 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:21 executing program 2: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:21 executing program 6: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r1 = socket(0x11, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) bind$packet(r1, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000150000000c00018008000300000000002800018014000200626f6e645f736c6176655f3000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) [ 128.376308] blktrace: Concurrent blktraces are not allowed on sg0 [ 128.378390] blktrace: Concurrent blktraces are not allowed on sg0 [ 128.383821] blktrace: Concurrent blktraces are not allowed on sg0 [ 128.387337] blktrace: Concurrent blktraces are not allowed on sg0 [ 128.424496] blktrace: Concurrent blktraces are not allowed on sg0 [ 128.484060] blktrace: Concurrent blktraces are not allowed on sg0 [ 128.500950] blktrace: Concurrent blktraces are not allowed on sg0 11:07:21 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:21 executing program 2: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:21 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:21 executing program 4: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:21 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r1 = socket(0x11, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) bind$packet(r1, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000150000000c00018008000300000000002800018014000200626f6e645f736c6176655f3000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) 11:07:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r1 = socket(0x11, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) bind$packet(r1, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000150000000c00018008000300000000002800018014000200626f6e645f736c6176655f3000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) [ 128.634004] blktrace: Concurrent blktraces are not allowed on sg0 [ 128.664398] blktrace: Concurrent blktraces are not allowed on sg0 [ 128.755129] blktrace: Concurrent blktraces are not allowed on sg0 11:07:21 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:21 executing program 7: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) [ 128.831246] blktrace: Concurrent blktraces are not allowed on sg0 11:07:21 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r1 = socket(0x11, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) bind$packet(r1, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000150000000c00018008000300000000002800018014000200626f6e645f736c6176655f3000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) 11:07:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r1 = socket(0x11, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) bind$packet(r1, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000150000000c00018008000300000000002800018014000200626f6e645f736c6176655f3000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) 11:07:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r1 = socket(0x11, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) bind$packet(r1, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000150000000c00018008000300000000002800018014000200626f6e645f736c6176655f3000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) [ 128.934750] blktrace: Concurrent blktraces are not allowed on sg0 11:07:21 executing program 2: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) [ 128.991561] blktrace: Concurrent blktraces are not allowed on sg0 11:07:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r1 = socket(0x11, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) bind$packet(r1, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000150000000c00018008000300000000002800018014000200626f6e645f736c6176655f3000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="09f9dc8fa58b8e8d344b0fecf974b24329f2db179e0b346e2cbd147dcf14b6f68f84b4d2698b57f46ce6ef3d84ad2bfdfb8d082e7f28b2a5be750e5613e88738e48d250453795f067ae0677eb51ba0a3462f648aa7845a69be46184ded4b2d20000453e89e3f7c92e7b32c7b626578f7f8420c6a984a11007489dd632cabe32a601f310bdd7a2c5fb28778c0d2b3e450d4eddafc876b9a566454000000000100000071d634fe630ccb174dcf2582a5e27ec93e695727f222c38bbcde31b98ea1acc1a0ace9dd73f9621a3a7f86b401bb8bc20c594343f179b91f3c47dfa857fcb1160972a5f8b489a5a563e158299b82add486a8cffdd09c427882af330a5966cefa20189c1f336d94f0cfb134afa6f3d3e86286bd17d1d659dbadce0bde7903d438c48e2db9b097dfe493042360676f71b204bd2cd85c53f82ca25958c8af0000"], 0x48}}, 0x0) [ 129.106351] blktrace: Concurrent blktraces are not allowed on sg0 11:07:21 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r1 = socket(0x11, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) bind$packet(r1, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000150000000c00018008000300000000002800018014000200626f6e645f736c6176655f3000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="09f9dc8fa58b8e8d344b0fecf974b24329f2db179e0b346e2cbd147dcf14b6f68f84b4d2698b57f46ce6ef3d84ad2bfdfb8d082e7f28b2a5be750e5613e88738e48d250453795f067ae0677eb51ba0a3462f648aa7845a69be46184ded4b2d20000453e89e3f7c92e7b32c7b626578f7f8420c6a984a11007489dd632cabe32a601f310bdd7a2c5fb28778c0d2b3e450d4eddafc876b9a566454000000000100000071d634fe630ccb174dcf2582a5e27ec93e695727f222c38bbcde31b98ea1acc1a0ace9dd73f9621a3a7f86b401bb8bc20c594343f179b91f3c47dfa857fcb1160972a5f8b489a5a563e158299b82add486a8cffdd09c427882af330a5966cefa20189c1f336d94f0cfb134afa6f3d3e86286bd17d1d659dbadce0bde7903d438c48e2db9b097dfe493042360676f71b204bd2cd85c53f82ca25958c8af0000"], 0x48}}, 0x0) 11:07:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r1 = socket(0x11, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) bind$packet(r1, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000150000000c00018008000300000000002800018014000200626f6e645f736c6176655f3000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) [ 129.548839] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4195 comm=syz-executor.3 11:07:24 executing program 4: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 11:07:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r1 = socket(0x11, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000140)={0x1}) bind$packet(r1, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000150000000c00018008000300000000002800018014000200626f6e645f736c6176655f3000000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) 11:07:24 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) openat$hpet( VM DIAGNOSIS: 11:07:16 Registers: info registers vcpu 0 RAX=0000000000000079 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823bda91 RDI=ffffffff8765c9a0 RBP=ffffffff8765c960 RSP=ffff88803fb27690 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000079 R11=0000000000000001 R12=0000000000000079 R13=ffffffff8765c960 R14=0000000000000010 R15=ffffffff823bda80 RIP=ffffffff823bdae9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fdc8220a700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000000000000 CR3=000000003e4ae000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007fdc84d7b7c000007fdc84d7b7c8 XMM02=00007fdc84d7b7e000007fdc84d7b7c0 XMM03=00007fdc84d7b7c800007fdc84d7b7c0 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=000000000000c451 RBX=ffff88806ce3f080 RCX=ffffc900007f3000 RDX=0000000000040000 RSI=ffffffff813bcaa7 RDI=0000000000000005 RBP=0000000000000000 RSP=ffff88803faff9d0 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000003 R13=ffffed100d9c7e11 R14=ffff88806ce3f088 R15=0000000000000001 RIP=ffffffff813bcaa9 RFL=00000216 [----AP-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007ff4d2b36700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000020000280 CR3=000000003e2e0000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007ff4d56a77c000007ff4d56a77c8 XMM02=00007ff4d56a77e000007ff4d56a77c0 XMM03=00007ff4d56a77c800007ff4d56a77c0 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000