Debian GNU/Linux 11 syzkaller ttyS0 Warning: Permanently added '[localhost]:6551' (ECDSA) to the list of known hosts. 2022/09/12 13:53:31 fuzzer started 2022/09/12 13:53:32 dialing manager at localhost:38027 syzkaller login: [ 38.777132] cgroup: Unknown subsys name 'net' [ 38.869524] cgroup: Unknown subsys name 'rlimit' 2022/09/12 13:53:46 syscalls: 2215 2022/09/12 13:53:46 code coverage: enabled 2022/09/12 13:53:46 comparison tracing: enabled 2022/09/12 13:53:46 extra coverage: enabled 2022/09/12 13:53:46 setuid sandbox: enabled 2022/09/12 13:53:46 namespace sandbox: enabled 2022/09/12 13:53:46 Android sandbox: enabled 2022/09/12 13:53:46 fault injection: enabled 2022/09/12 13:53:46 leak checking: enabled 2022/09/12 13:53:46 net packet injection: enabled 2022/09/12 13:53:46 net device setup: enabled 2022/09/12 13:53:46 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/12 13:53:46 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/12 13:53:46 USB emulation: enabled 2022/09/12 13:53:46 hci packet injection: enabled 2022/09/12 13:53:46 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220912) 2022/09/12 13:53:46 802.15.4 emulation: enabled 2022/09/12 13:53:46 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/12 13:53:46 fetching corpus: 50, signal 30664/33897 (executing program) 2022/09/12 13:53:46 fetching corpus: 100, signal 42813/47203 (executing program) 2022/09/12 13:53:47 fetching corpus: 150, signal 55366/60585 (executing program) 2022/09/12 13:53:47 fetching corpus: 200, signal 65901/71831 (executing program) 2022/09/12 13:53:47 fetching corpus: 250, signal 72279/78910 (executing program) 2022/09/12 13:53:47 fetching corpus: 300, signal 78048/85305 (executing program) 2022/09/12 13:53:47 fetching corpus: 350, signal 83312/91043 (executing program) 2022/09/12 13:53:47 fetching corpus: 400, signal 86233/94583 (executing program) 2022/09/12 13:53:48 fetching corpus: 450, signal 91278/99941 (executing program) 2022/09/12 13:53:48 fetching corpus: 500, signal 94910/103948 (executing program) 2022/09/12 13:53:48 fetching corpus: 550, signal 98120/107522 (executing program) 2022/09/12 13:53:48 fetching corpus: 600, signal 103012/112370 (executing program) 2022/09/12 13:53:48 fetching corpus: 650, signal 106747/116157 (executing program) 2022/09/12 13:53:48 fetching corpus: 700, signal 108810/118500 (executing program) 2022/09/12 13:53:49 fetching corpus: 750, signal 111361/121207 (executing program) 2022/09/12 13:53:49 fetching corpus: 800, signal 113271/123297 (executing program) 2022/09/12 13:53:49 fetching corpus: 850, signal 115952/125926 (executing program) 2022/09/12 13:53:49 fetching corpus: 900, signal 119321/129102 (executing program) 2022/09/12 13:53:49 fetching corpus: 950, signal 121937/131580 (executing program) 2022/09/12 13:53:49 fetching corpus: 1000, signal 123860/133559 (executing program) 2022/09/12 13:53:50 fetching corpus: 1050, signal 126364/135846 (executing program) 2022/09/12 13:53:50 fetching corpus: 1100, signal 128052/137461 (executing program) 2022/09/12 13:53:50 fetching corpus: 1150, signal 129672/138993 (executing program) 2022/09/12 13:53:50 fetching corpus: 1200, signal 131819/140862 (executing program) 2022/09/12 13:53:50 fetching corpus: 1250, signal 133691/142439 (executing program) 2022/09/12 13:53:51 fetching corpus: 1300, signal 135512/143977 (executing program) 2022/09/12 13:53:51 fetching corpus: 1350, signal 137347/145458 (executing program) 2022/09/12 13:53:51 fetching corpus: 1400, signal 138608/146568 (executing program) 2022/09/12 13:53:51 fetching corpus: 1450, signal 140296/147921 (executing program) 2022/09/12 13:53:51 fetching corpus: 1500, signal 141678/149023 (executing program) 2022/09/12 13:53:51 fetching corpus: 1550, signal 142819/149990 (executing program) 2022/09/12 13:53:51 fetching corpus: 1600, signal 144560/151246 (executing program) 2022/09/12 13:53:52 fetching corpus: 1650, signal 145573/152032 (executing program) 2022/09/12 13:53:52 fetching corpus: 1700, signal 146232/152598 (executing program) 2022/09/12 13:53:52 fetching corpus: 1750, signal 147505/153511 (executing program) 2022/09/12 13:53:52 fetching corpus: 1800, signal 148832/154361 (executing program) 2022/09/12 13:53:52 fetching corpus: 1850, signal 150428/155359 (executing program) 2022/09/12 13:53:52 fetching corpus: 1900, signal 151619/156116 (executing program) 2022/09/12 13:53:52 fetching corpus: 1950, signal 152851/157005 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/157941 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/158028 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/158126 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/158216 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/158299 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/158379 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/158473 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/158560 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/158644 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/158741 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/158834 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/158918 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/159007 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/159101 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/159197 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/159288 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/159367 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/159439 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/159526 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/159602 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/159694 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/159783 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/159878 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/159977 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/160097 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/160188 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/160294 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/160382 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/160465 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/160538 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/160653 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/160750 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/160849 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/160938 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/161031 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/161114 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/161200 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/161293 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/161345 (executing program) 2022/09/12 13:53:53 fetching corpus: 2000, signal 154218/161345 (executing program) 2022/09/12 13:53:56 starting 8 fuzzer processes 13:53:56 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0}, {&(0x7f0000011500)}], 0x0, &(0x7f0000012f00)) 13:53:56 executing program 1: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x9, 0x8, 0x6, 0x0, 0x0, 0x100000000, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x595}, 0x2, 0x0, 0xffff, 0x9, 0x2c28, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xaa5eb0d9c157aee9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) shutdown(r0, 0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000180)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}, {0x0}], 0x2, 0x7, 0xfbd1) 13:53:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$setstatus(r1, 0x4, 0x82000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000bc0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) 13:53:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) [ 62.952725] audit: type=1400 audit(1662990836.446:6): avc: denied { execmem } for pid=283 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 13:53:56 executing program 4: clock_nanosleep(0xb, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) 13:53:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000003fc0)={0x28, 0x65, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x1}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) 13:53:56 executing program 6: syz_usb_connect$uac1(0x0, 0x8c, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7a, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x5, 0x0, 0x9}, @format_type_i_discrete={0xa, 0x24, 0x2, 0x1, 0x0, 0x4, 0x0, 0x9, "2f15"}]}, {{0x9, 0x5, 0x82, 0x9, 0x40, 0x0, 0x40, 0xff, {0x7, 0x25, 0x1, 0x2, 0xfe}}}}}}}]}}, 0x0) set_mempolicy(0x4000, 0x0, 0x2) getrusage(0x1, &(0x7f0000000ec0)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x50, 0x0, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@GTPA_LINK={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @private=0xa010100}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_LINK={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x4800) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) 13:53:56 executing program 7: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@multicast, @empty, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @multicast1}, {0x12, 0x0, 0x0, @empty=0xe0000001}}}}}, 0x0) [ 64.274185] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 64.276188] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 64.278366] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 64.281616] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 64.284661] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 64.287015] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 64.291565] Bluetooth: hci0: HCI_REQ-0x0c1a [ 64.322952] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 64.324579] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 64.326804] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 64.328623] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 64.329617] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 64.331691] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 64.335225] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 64.339042] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 64.340125] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 64.342780] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 64.349519] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 64.351960] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 64.356028] Bluetooth: hci1: HCI_REQ-0x0c1a [ 64.366097] Bluetooth: hci2: HCI_REQ-0x0c1a [ 64.389675] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 64.393644] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 64.396010] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 64.399923] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 64.401781] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 64.404545] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 64.409995] Bluetooth: hci3: HCI_REQ-0x0c1a [ 64.410556] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 64.413261] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 64.415203] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 64.423248] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 64.424975] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 64.426759] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 64.430053] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 64.431930] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 64.433787] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 64.441585] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 64.447322] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 64.448680] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 64.449998] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 64.451366] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 64.453290] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 64.454504] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 64.465472] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 64.472200] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 64.473504] Bluetooth: hci4: HCI_REQ-0x0c1a [ 64.482791] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 64.487235] Bluetooth: hci5: HCI_REQ-0x0c1a [ 64.497036] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 64.498722] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 64.518924] Bluetooth: hci6: HCI_REQ-0x0c1a [ 64.524977] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 64.528324] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 64.532545] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 64.537754] Bluetooth: hci7: HCI_REQ-0x0c1a [ 66.355322] Bluetooth: hci0: command 0x0409 tx timeout [ 66.418929] Bluetooth: hci2: command 0x0409 tx timeout [ 66.419933] Bluetooth: hci1: command 0x0409 tx timeout [ 66.482960] Bluetooth: hci4: command 0x0409 tx timeout [ 66.483909] Bluetooth: hci3: command 0x0409 tx timeout [ 66.547004] Bluetooth: hci5: command 0x0409 tx timeout [ 66.547902] Bluetooth: hci7: command 0x0409 tx timeout [ 66.548382] Bluetooth: hci6: command 0x0409 tx timeout [ 68.403889] Bluetooth: hci0: command 0x041b tx timeout [ 68.467948] Bluetooth: hci1: command 0x041b tx timeout [ 68.468768] Bluetooth: hci2: command 0x041b tx timeout [ 68.531995] Bluetooth: hci3: command 0x041b tx timeout [ 68.532551] Bluetooth: hci4: command 0x041b tx timeout [ 68.594885] Bluetooth: hci7: command 0x041b tx timeout [ 68.595978] Bluetooth: hci6: command 0x041b tx timeout [ 68.597057] Bluetooth: hci5: command 0x041b tx timeout [ 70.451919] Bluetooth: hci0: command 0x040f tx timeout [ 70.515895] Bluetooth: hci2: command 0x040f tx timeout [ 70.516419] Bluetooth: hci1: command 0x040f tx timeout [ 70.579917] Bluetooth: hci4: command 0x040f tx timeout [ 70.580439] Bluetooth: hci3: command 0x040f tx timeout [ 70.643970] Bluetooth: hci5: command 0x040f tx timeout [ 70.644639] Bluetooth: hci6: command 0x040f tx timeout [ 70.646152] Bluetooth: hci7: command 0x040f tx timeout [ 72.499911] Bluetooth: hci0: command 0x0419 tx timeout [ 72.563934] Bluetooth: hci1: command 0x0419 tx timeout [ 72.564418] Bluetooth: hci2: command 0x0419 tx timeout [ 72.627997] Bluetooth: hci3: command 0x0419 tx timeout [ 72.628477] Bluetooth: hci4: command 0x0419 tx timeout [ 72.691905] Bluetooth: hci7: command 0x0419 tx timeout [ 72.692377] Bluetooth: hci6: command 0x0419 tx timeout [ 72.692792] Bluetooth: hci5: command 0x0419 tx timeout [ 118.868122] audit: type=1400 audit(1662990892.362:7): avc: denied { open } for pid=3741 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 118.869605] audit: type=1400 audit(1662990892.362:8): avc: denied { kernel } for pid=3741 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 118.881393] ------------[ cut here ]------------ [ 118.881416] [ 118.881420] ====================================================== [ 118.881423] WARNING: possible circular locking dependency detected [ 118.881428] 6.0.0-rc5-next-20220912 #1 Not tainted [ 118.881434] ------------------------------------------------------ [ 118.881437] syz-executor.2/3742 is trying to acquire lock: [ 118.881444] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 118.881483] [ 118.881483] but task is already holding lock: [ 118.881486] ffff88800d898820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 118.881514] [ 118.881514] which lock already depends on the new lock. [ 118.881514] [ 118.881517] [ 118.881517] the existing dependency chain (in reverse order) is: [ 118.881521] [ 118.881521] -> #3 (&ctx->lock){....}-{2:2}: [ 118.881534] _raw_spin_lock+0x2a/0x40 [ 118.881552] __perf_event_task_sched_out+0x53b/0x18d0 [ 118.881564] __schedule+0xedd/0x2470 [ 118.881574] schedule+0xda/0x1b0 [ 118.881583] exit_to_user_mode_prepare+0x114/0x1a0 [ 118.881604] syscall_exit_to_user_mode+0x19/0x40 [ 118.881622] do_syscall_64+0x48/0x90 [ 118.881636] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.881653] [ 118.881653] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 118.881667] _raw_spin_lock_nested+0x30/0x40 [ 118.881682] raw_spin_rq_lock_nested+0x1e/0x30 [ 118.881695] task_fork_fair+0x63/0x4d0 [ 118.881713] sched_cgroup_fork+0x3d0/0x540 [ 118.881727] copy_process+0x3f9e/0x6df0 [ 118.881738] kernel_clone+0xe7/0x890 [ 118.881747] user_mode_thread+0xad/0xf0 [ 118.881758] rest_init+0x24/0x250 [ 118.881774] arch_call_rest_init+0xf/0x14 [ 118.881793] start_kernel+0x4c1/0x4e6 [ 118.881810] secondary_startup_64_no_verify+0xe0/0xeb [ 118.881828] [ 118.881828] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 118.881841] _raw_spin_lock_irqsave+0x39/0x60 [ 118.881856] try_to_wake_up+0xab/0x1920 [ 118.881870] up+0x75/0xb0 [ 118.881881] __up_console_sem+0x6e/0x80 [ 118.881898] console_unlock+0x46a/0x590 [ 118.881914] vt_ioctl+0x2822/0x2ca0 [ 118.881927] tty_ioctl+0x7c4/0x1700 [ 118.881938] __x64_sys_ioctl+0x19a/0x210 [ 118.881954] do_syscall_64+0x3b/0x90 [ 118.881967] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.881983] [ 118.881983] -> #0 ((console_sem).lock){....}-{2:2}: [ 118.881997] __lock_acquire+0x2a02/0x5e70 [ 118.882014] lock_acquire+0x1a2/0x530 [ 118.882030] _raw_spin_lock_irqsave+0x39/0x60 [ 118.882045] down_trylock+0xe/0x70 [ 118.882058] __down_trylock_console_sem+0x3b/0xd0 [ 118.882074] vprintk_emit+0x16b/0x560 [ 118.882091] vprintk+0x84/0xa0 [ 118.882108] _printk+0xba/0xf1 [ 118.882126] report_bug.cold+0x72/0xab [ 118.882138] handle_bug+0x3c/0x70 [ 118.882151] exc_invalid_op+0x14/0x50 [ 118.882164] asm_exc_invalid_op+0x16/0x20 [ 118.882180] group_sched_out.part.0+0x2c7/0x460 [ 118.882191] ctx_sched_out+0x8f1/0xc10 [ 118.882201] __perf_event_task_sched_out+0x6d0/0x18d0 [ 118.882213] __schedule+0xedd/0x2470 [ 118.882222] schedule+0xda/0x1b0 [ 118.882231] exit_to_user_mode_prepare+0x114/0x1a0 [ 118.882251] syscall_exit_to_user_mode+0x19/0x40 [ 118.882268] do_syscall_64+0x48/0x90 [ 118.882280] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.882297] [ 118.882297] other info that might help us debug this: [ 118.882297] [ 118.882300] Chain exists of: [ 118.882300] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 118.882300] [ 118.882315] Possible unsafe locking scenario: [ 118.882315] [ 118.882317] CPU0 CPU1 [ 118.882320] ---- ---- [ 118.882322] lock(&ctx->lock); [ 118.882328] lock(&rq->__lock); [ 118.882334] lock(&ctx->lock); [ 118.882340] lock((console_sem).lock); [ 118.882346] [ 118.882346] *** DEADLOCK *** [ 118.882346] [ 118.882348] 2 locks held by syz-executor.2/3742: [ 118.882355] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 118.882380] #1: ffff88800d898820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 118.882410] [ 118.882410] stack backtrace: [ 118.882414] CPU: 0 PID: 3742 Comm: syz-executor.2 Not tainted 6.0.0-rc5-next-20220912 #1 [ 118.882429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 118.882437] Call Trace: [ 118.882441] [ 118.882445] dump_stack_lvl+0x8b/0xb3 [ 118.882460] check_noncircular+0x263/0x2e0 [ 118.882477] ? format_decode+0x26c/0xb50 [ 118.882492] ? print_circular_bug+0x450/0x450 [ 118.882509] ? enable_ptr_key_workfn+0x20/0x20 [ 118.882525] ? format_decode+0x26c/0xb50 [ 118.882541] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 118.882559] __lock_acquire+0x2a02/0x5e70 [ 118.882583] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 118.882602] ? __mutex_add_waiter+0x120/0x120 [ 118.882622] lock_acquire+0x1a2/0x530 [ 118.882639] ? down_trylock+0xe/0x70 [ 118.882654] ? rcu_read_unlock+0x40/0x40 [ 118.882677] ? vprintk+0x84/0xa0 [ 118.882696] _raw_spin_lock_irqsave+0x39/0x60 [ 118.882711] ? down_trylock+0xe/0x70 [ 118.882725] down_trylock+0xe/0x70 [ 118.882739] ? vprintk+0x84/0xa0 [ 118.882756] __down_trylock_console_sem+0x3b/0xd0 [ 118.882774] vprintk_emit+0x16b/0x560 [ 118.882794] vprintk+0x84/0xa0 [ 118.882812] _printk+0xba/0xf1 [ 118.882830] ? record_print_text.cold+0x16/0x16 [ 118.882853] ? report_bug.cold+0x66/0xab [ 118.882868] ? group_sched_out.part.0+0x2c7/0x460 [ 118.882879] report_bug.cold+0x72/0xab [ 118.882895] handle_bug+0x3c/0x70 [ 118.882909] exc_invalid_op+0x14/0x50 [ 118.882923] asm_exc_invalid_op+0x16/0x20 [ 118.882940] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 118.882954] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 118.882965] RSP: 0018:ffff88800d19fc48 EFLAGS: 00010006 [ 118.882975] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 118.882982] RDX: ffff888014ea9ac0 RSI: ffffffff81566027 RDI: 0000000000000005 [ 118.882990] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 118.882998] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800d898800 [ 118.883006] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 118.883018] ? group_sched_out.part.0+0x2c7/0x460 [ 118.883031] ? group_sched_out.part.0+0x2c7/0x460 [ 118.883045] ctx_sched_out+0x8f1/0xc10 [ 118.883058] __perf_event_task_sched_out+0x6d0/0x18d0 [ 118.883074] ? lock_is_held_type+0xd7/0x130 [ 118.883094] ? __perf_cgroup_move+0x160/0x160 [ 118.883106] ? set_next_entity+0x304/0x550 [ 118.883124] ? update_curr+0x267/0x740 [ 118.883143] ? lock_is_held_type+0xd7/0x130 [ 118.883162] __schedule+0xedd/0x2470 [ 118.883176] ? io_schedule_timeout+0x150/0x150 [ 118.883189] ? __x64_sys_futex_time32+0x480/0x480 [ 118.883204] schedule+0xda/0x1b0 [ 118.883215] exit_to_user_mode_prepare+0x114/0x1a0 [ 118.883236] syscall_exit_to_user_mode+0x19/0x40 [ 118.883254] do_syscall_64+0x48/0x90 [ 118.883268] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.883286] RIP: 0033:0x7fad8c661b19 [ 118.883294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 118.883305] RSP: 002b:00007fad89bd7218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 118.883316] RAX: 0000000000000001 RBX: 00007fad8c774f68 RCX: 00007fad8c661b19 [ 118.883323] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fad8c774f6c [ 118.883331] RBP: 00007fad8c774f60 R08: 000000000000000e R09: 0000000000000000 [ 118.883338] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fad8c774f6c [ 118.883346] R13: 00007ffe158cfdcf R14: 00007fad89bd7300 R15: 0000000000022000 [ 118.883360] [ 118.939047] WARNING: CPU: 0 PID: 3742 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 118.939736] Modules linked in: [ 118.939986] CPU: 0 PID: 3742 Comm: syz-executor.2 Not tainted 6.0.0-rc5-next-20220912 #1 [ 118.940593] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 118.941430] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 118.941845] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 118.943196] RSP: 0018:ffff88800d19fc48 EFLAGS: 00010006 [ 118.943596] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 118.944132] RDX: ffff888014ea9ac0 RSI: ffffffff81566027 RDI: 0000000000000005 [ 118.944662] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 118.945196] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800d898800 [ 118.945731] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 118.946273] FS: 00007fad89bd7700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 118.946869] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 118.947305] CR2: 00007f603d44b438 CR3: 0000000015f0c000 CR4: 0000000000350ef0 [ 118.947838] Call Trace: [ 118.948037] [ 118.948219] ctx_sched_out+0x8f1/0xc10 [ 118.948514] __perf_event_task_sched_out+0x6d0/0x18d0 [ 118.948916] ? lock_is_held_type+0xd7/0x130 [ 118.949247] ? __perf_cgroup_move+0x160/0x160 [ 118.949583] ? set_next_entity+0x304/0x550 [ 118.949913] ? update_curr+0x267/0x740 [ 118.950213] ? lock_is_held_type+0xd7/0x130 [ 118.950544] __schedule+0xedd/0x2470 [ 118.950833] ? io_schedule_timeout+0x150/0x150 [ 118.951185] ? __x64_sys_futex_time32+0x480/0x480 [ 118.951552] schedule+0xda/0x1b0 [ 118.951814] exit_to_user_mode_prepare+0x114/0x1a0 [ 118.952196] syscall_exit_to_user_mode+0x19/0x40 [ 118.952566] do_syscall_64+0x48/0x90 [ 118.952858] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.953256] RIP: 0033:0x7fad8c661b19 [ 118.953538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 118.954885] RSP: 002b:00007fad89bd7218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 118.955451] RAX: 0000000000000001 RBX: 00007fad8c774f68 RCX: 00007fad8c661b19 [ 118.955980] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fad8c774f6c [ 118.956516] RBP: 00007fad8c774f60 R08: 000000000000000e R09: 0000000000000000 [ 118.957041] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fad8c774f6c [ 118.957573] R13: 00007ffe158cfdcf R14: 00007fad89bd7300 R15: 0000000000022000 [ 118.958118] [ 118.958300] irq event stamp: 582 [ 118.958553] hardirqs last enabled at (581): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 118.959266] hardirqs last disabled at (582): [] __schedule+0x1225/0x2470 [ 118.959877] softirqs last enabled at (454): [] __irq_exit_rcu+0x11b/0x180 [ 118.960527] softirqs last disabled at (449): [] __irq_exit_rcu+0x11b/0x180 [ 118.961152] ---[ end trace 0000000000000000 ]--- 13:54:52 executing program 4: clock_nanosleep(0xb, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) 13:54:52 executing program 4: clock_nanosleep(0xb, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) 13:54:52 executing program 4: clock_nanosleep(0xb, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) 13:54:52 executing program 4: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$setstatus(r1, 0x4, 0x82000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000bc0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) 13:54:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$setstatus(r1, 0x4, 0x82000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000bc0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) 13:54:52 executing program 4: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$setstatus(r1, 0x4, 0x82000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000bc0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) [ 120.862084] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 120.920529] loop0: detected capacity change from 0 to 2048 [ 120.923945] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 120.924599] EXT4-fs (loop0): group descriptors corrupted! [ 121.420652] syz-executor.3 (3949) used greatest stack depth: 24536 bytes left [ 121.538962] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 121.540204] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 122.045685] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 122.047362] misc raw-gadget: fail, usb_gadget_register_driver returned -16 13:54:55 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0}, {&(0x7f0000011500)}], 0x0, &(0x7f0000012f00)) 13:54:55 executing program 7: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@multicast, @empty, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @multicast1}, {0x12, 0x0, 0x0, @empty=0xe0000001}}}}}, 0x0) 13:54:55 executing program 1: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x9, 0x8, 0x6, 0x0, 0x0, 0x100000000, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x595}, 0x2, 0x0, 0xffff, 0x9, 0x2c28, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xaa5eb0d9c157aee9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) shutdown(r0, 0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000180)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}, {0x0}], 0x2, 0x7, 0xfbd1) 13:54:55 executing program 4: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) [ 122.096116] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 13:54:55 executing program 6: syz_usb_connect$uac1(0x0, 0x8c, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7a, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x5, 0x0, 0x9}, @format_type_i_discrete={0xa, 0x24, 0x2, 0x1, 0x0, 0x4, 0x0, 0x9, "2f15"}]}, {{0x9, 0x5, 0x82, 0x9, 0x40, 0x0, 0x40, 0xff, {0x7, 0x25, 0x1, 0x2, 0xfe}}}}}}}]}}, 0x0) set_mempolicy(0x4000, 0x0, 0x2) getrusage(0x1, &(0x7f0000000ec0)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x50, 0x0, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@GTPA_LINK={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @private=0xa010100}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_LINK={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x4800) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) 13:54:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 13:54:55 executing program 2: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000003fc0)={0x28, 0x65, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x1}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) [ 122.125848] hrtimer: interrupt took 18525 ns 13:54:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000003fc0)={0x28, 0x65, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x1}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) 13:54:55 executing program 7: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@multicast, @empty, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @multicast1}, {0x12, 0x0, 0x0, @empty=0xe0000001}}}}}, 0x0) [ 122.190626] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 122.193906] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 122.195317] misc raw-gadget: fail, usb_gadget_register_driver returned -16 13:54:55 executing program 4: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 13:54:55 executing program 7: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@multicast, @empty, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @multicast1}, {0x12, 0x0, 0x0, @empty=0xe0000001}}}}}, 0x0) 13:54:55 executing program 1: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x9, 0x8, 0x6, 0x0, 0x0, 0x100000000, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x595}, 0x2, 0x0, 0xffff, 0x9, 0x2c28, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xaa5eb0d9c157aee9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) shutdown(r0, 0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000180)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}, {0x0}], 0x2, 0x7, 0xfbd1) 13:54:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000003fc0)={0x28, 0x65, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x1}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) [ 122.332981] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 13:54:55 executing program 2: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) [ 122.698139] loop0: detected capacity change from 0 to 2048 [ 122.881668] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 122.884254] EXT4-fs (loop0): group descriptors corrupted! [ 122.974048] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 13:54:56 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0}, {&(0x7f0000011500)}], 0x0, &(0x7f0000012f00)) 13:54:56 executing program 4: syz_usb_connect$uac1(0x0, 0x8c, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7a, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x5, 0x0, 0x9}, @format_type_i_discrete={0xa, 0x24, 0x2, 0x1, 0x0, 0x4, 0x0, 0x9, "2f15"}]}, {{0x9, 0x5, 0x82, 0x9, 0x40, 0x0, 0x40, 0xff, {0x7, 0x25, 0x1, 0x2, 0xfe}}}}}}}]}}, 0x0) set_mempolicy(0x4000, 0x0, 0x2) getrusage(0x1, &(0x7f0000000ec0)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x50, 0x0, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@GTPA_LINK={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @private=0xa010100}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_LINK={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x4800) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) 13:54:56 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 13:54:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 13:54:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 13:54:56 executing program 1: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x9, 0x8, 0x6, 0x0, 0x0, 0x100000000, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x595}, 0x2, 0x0, 0xffff, 0x9, 0x2c28, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xaa5eb0d9c157aee9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) shutdown(r0, 0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000180)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}, {0x0}], 0x2, 0x7, 0xfbd1) 13:54:56 executing program 2: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:56 executing program 6: syz_usb_connect$uac1(0x0, 0x8c, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7a, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x5, 0x0, 0x9}, @format_type_i_discrete={0xa, 0x24, 0x2, 0x1, 0x0, 0x4, 0x0, 0x9, "2f15"}]}, {{0x9, 0x5, 0x82, 0x9, 0x40, 0x0, 0x40, 0xff, {0x7, 0x25, 0x1, 0x2, 0xfe}}}}}}}]}}, 0x0) set_mempolicy(0x4000, 0x0, 0x2) getrusage(0x1, &(0x7f0000000ec0)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x50, 0x0, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@GTPA_LINK={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @private=0xa010100}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_LINK={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x4800) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) [ 122.978822] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 122.979753] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 123.000020] loop0: detected capacity change from 0 to 2048 [ 123.010426] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 123.011455] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 123.012284] EXT4-fs (loop0): group descriptors corrupted! [ 123.041673] I/O error, dev loop0, sector 24 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 123.654750] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 123.655698] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 123.656296] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 13:54:57 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {0x0}, {&(0x7f0000011500)}], 0x0, &(0x7f0000012f00)) 13:54:57 executing program 2: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x9, 0x8, 0x6, 0x0, 0x0, 0x100000000, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x595}, 0x2, 0x0, 0xffff, 0x9, 0x2c28, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xaa5eb0d9c157aee9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) shutdown(r0, 0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000180)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}, {0x0}], 0x2, 0x7, 0xfbd1) 13:54:57 executing program 4: syz_usb_connect$uac1(0x0, 0x8c, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7a, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x5, 0x0, 0x9}, @format_type_i_discrete={0xa, 0x24, 0x2, 0x1, 0x0, 0x4, 0x0, 0x9, "2f15"}]}, {{0x9, 0x5, 0x82, 0x9, 0x40, 0x0, 0x40, 0xff, {0x7, 0x25, 0x1, 0x2, 0xfe}}}}}}}]}}, 0x0) set_mempolicy(0x4000, 0x0, 0x2) getrusage(0x1, &(0x7f0000000ec0)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x50, 0x0, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@GTPA_LINK={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @private=0xa010100}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_LINK={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x4800) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) 13:54:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 13:54:57 executing program 1: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x9, 0x8, 0x6, 0x0, 0x0, 0x100000000, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x595}, 0x2, 0x0, 0xffff, 0x9, 0x2c28, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xaa5eb0d9c157aee9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) shutdown(r0, 0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000180)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}, {0x0}], 0x2, 0x7, 0xfbd1) 13:54:57 executing program 6: syz_usb_connect$uac1(0x0, 0x8c, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7a, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x5, 0x0, 0x9}, @format_type_i_discrete={0xa, 0x24, 0x2, 0x1, 0x0, 0x4, 0x0, 0x9, "2f15"}]}, {{0x9, 0x5, 0x82, 0x9, 0x40, 0x0, 0x40, 0xff, {0x7, 0x25, 0x1, 0x2, 0xfe}}}}}}}]}}, 0x0) set_mempolicy(0x4000, 0x0, 0x2) getrusage(0x1, &(0x7f0000000ec0)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x50, 0x0, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@GTPA_LINK={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @private=0xa010100}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_LINK={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x4800) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) 13:54:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) [ 123.679199] misc raw-gadget: fail, usb_gadget_register_driver returned -16 13:54:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 13:54:57 executing program 3: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x9, 0x8, 0x6, 0x0, 0x0, 0x100000000, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x595}, 0x2, 0x0, 0xffff, 0x9, 0x2c28, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xaa5eb0d9c157aee9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) shutdown(r0, 0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000180)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}, {0x0}], 0x2, 0x7, 0xfbd1) [ 123.731669] loop0: detected capacity change from 0 to 2048 [ 123.749677] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 123.750680] EXT4-fs (loop0): group descriptors corrupted! 13:54:57 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:57 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:57 executing program 1: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x9, 0x8, 0x6, 0x0, 0x0, 0x100000000, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x595}, 0x2, 0x0, 0xffff, 0x9, 0x2c28, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xaa5eb0d9c157aee9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) shutdown(r0, 0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000180)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}, {0x0}], 0x2, 0x7, 0xfbd1) 13:54:57 executing program 3: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x9, 0x8, 0x6, 0x0, 0x0, 0x100000000, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x595}, 0x2, 0x0, 0xffff, 0x9, 0x2c28, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xaa5eb0d9c157aee9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) shutdown(r0, 0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000180)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}, {0x0}], 0x2, 0x7, 0xfbd1) 13:54:57 executing program 2: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x9, 0x8, 0x6, 0x0, 0x0, 0x100000000, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x595}, 0x2, 0x0, 0xffff, 0x9, 0x2c28, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xaa5eb0d9c157aee9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) shutdown(r0, 0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000180)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}, {0x0}], 0x2, 0x7, 0xfbd1) 13:54:57 executing program 1: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x9, 0x8, 0x6, 0x0, 0x0, 0x100000000, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x595}, 0x2, 0x0, 0xffff, 0x9, 0x2c28, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xaa5eb0d9c157aee9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) shutdown(r0, 0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000180)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}, {0x0}], 0x2, 0x7, 0xfbd1) 13:54:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 13:54:57 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:57 executing program 4: syz_usb_connect$uac1(0x0, 0x8c, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7a, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x5, 0x0, 0x9}, @format_type_i_discrete={0xa, 0x24, 0x2, 0x1, 0x0, 0x4, 0x0, 0x9, "2f15"}]}, {{0x9, 0x5, 0x82, 0x9, 0x40, 0x0, 0x40, 0xff, {0x7, 0x25, 0x1, 0x2, 0xfe}}}}}}}]}}, 0x0) set_mempolicy(0x4000, 0x0, 0x2) getrusage(0x1, &(0x7f0000000ec0)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x50, 0x0, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@GTPA_LINK={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @private=0xa010100}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_LINK={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x4800) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) 13:54:57 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:57 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) [ 124.334689] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 13:54:57 executing program 3: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x9, 0x8, 0x6, 0x0, 0x0, 0x100000000, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x595}, 0x2, 0x0, 0xffff, 0x9, 0x2c28, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xaa5eb0d9c157aee9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_setup(0x5, &(0x7f0000000140)=0x0) shutdown(r0, 0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000180)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000002240)=""/4109, 0x100d}, {0x0}], 0x2, 0x7, 0xfbd1) [ 124.347268] misc raw-gadget: fail, usb_gadget_register_driver returned -16 13:54:57 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:57 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:57 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:57 executing program 3: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:58 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:58 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:58 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:58 executing program 3: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:58 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:58 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:58 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x8000000008}, 0x108, 0x5, 0x3, 0x7, 0x200000000000009, 0x7c, 0x38fc, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x7, 0x2b, 0x51, 0x0, 0x6, 0x8, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x3018, 0xd00, 0x0, 0x2, 0x2e3, 0x0, 0x8, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x1) r2 = msgget(0x0, 0x230) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000100)=""/230) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/128}, 0x88, 0x0, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[], 0x45, 0x800) msgctl$IPC_RMID(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000027f) 13:54:58 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xdb8a) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000617d185105761945f43ea2ec86568c49b371b38a2489545e5fef84ce29f9d8e96d2bff3a6544ac4593c499c6d95b8c88ea90c3b462d84a128392b8c09c5515e6fe516d4e31fe45d86522b622d987089241d59a2498aedcfad7e247df376e4da5d68ea8876dde536e60a04b2edfc10529569236449dae65d0c73dc43a3bef59ec072e9c4cffe5a95c2ea9fa277092803deea9c500f5a929d34a9ba61ebacd835020dcf67e28d3a8e4de2b1a24249bab2fa810ad3b7fba"], 0xcc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)='u', 0x1}, {&(0x7f0000000940)="2955690aabe7dc642b68c13319a85b55b46822f2dc29a8ef48a21f04fdc07f56f4c656ab88ec3d0af893733cd20c1df29c78e43d6fd9d3d622e7f42033038cec7eff24acaa766e94cda0acf89ed450513ddd7b99929561a3188ab1e8853219dff7c20ae89e71062ab91aa0222dbfefba3b7afa39ea7b82267ac97ccfac48c6b899a766c900dc18533a0e523f7ce57d27a5ffb22a6a64e635f332f9d169716b7e2714a618784840ee7989da65fe2e83e5666b8da7713b307c8d07c765", 0xbc, 0x2}], 0x82404, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x80, 0xfb, 0x30, 0x1, 0x8, 0x0, 0x7a8c, 0x820, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000849, 0x1, @perf_config_ext={0x0, 0x VM DIAGNOSIS: 13:54:52 Registers: info registers vcpu 0 RAX=0000000000000038 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b1e41 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff88800d19f698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000038 R11=0000000000000001 R12=0000000000000038 R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b1e30 RIP=ffffffff822b1e99 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fad89bd7700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f603d44b438 CR3=0000000015f0c000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fad8c7487c0 00007fad8c7487c8 YMM02=0000000000000000 0000000000000000 00007fad8c7487e0 00007fad8c7487c0 YMM03=0000000000000000 0000000000000000 00007fad8c7487c8 00007fad8c7487c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=ffff888009787878 RBX=ffff888009787910 RCX=ffffffff8111d3aa RDX=0000000000000001 RSI=0000000000000070 RDI=ffff888009787878 RBP=ffff888009787878 RSP=ffff8880097877f8 R8 =0000000000000001 R9 =ffffed1002e86fd4 R10=fffffbfff0b603e2 R11=0000000000000001 R12=0000000000000070 R13=0000000000000000 R14=ffff88800f349ac0 R15=ffff888009787878 RIP=ffffffff81787da2 RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007eff0c8416f4 CR3=0000000005226000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007eff0c850470 00007eff0c84ff20 YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 756e20796d6d7564 20736e6f6974706f YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 73253d656d616e6c 6165722073253d73 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000