syzkaller login: [ 38.872659] sshd (243) used greatest stack depth: 24744 bytes left Warning: Permanently added '[localhost]:47679' (ECDSA) to the list of known hosts. 2022/09/12 15:03:44 fuzzer started 2022/09/12 15:03:44 dialing manager at localhost:38027 [ 41.114745] cgroup: Unknown subsys name 'net' [ 41.216992] cgroup: Unknown subsys name 'rlimit' 2022/09/12 15:03:58 syscalls: 2215 2022/09/12 15:03:58 code coverage: enabled 2022/09/12 15:03:58 comparison tracing: enabled 2022/09/12 15:03:58 extra coverage: enabled 2022/09/12 15:03:58 setuid sandbox: enabled 2022/09/12 15:03:58 namespace sandbox: enabled 2022/09/12 15:03:58 Android sandbox: enabled 2022/09/12 15:03:58 fault injection: enabled 2022/09/12 15:03:58 leak checking: enabled 2022/09/12 15:03:58 net packet injection: enabled 2022/09/12 15:03:58 net device setup: enabled 2022/09/12 15:03:58 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/12 15:03:58 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/12 15:03:58 USB emulation: enabled 2022/09/12 15:03:58 hci packet injection: enabled 2022/09/12 15:03:58 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220912) 2022/09/12 15:03:58 802.15.4 emulation: enabled 2022/09/12 15:03:58 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/12 15:03:58 fetching corpus: 50, signal 27214/30685 (executing program) 2022/09/12 15:03:58 fetching corpus: 100, signal 40670/45506 (executing program) 2022/09/12 15:03:58 fetching corpus: 150, signal 51657/57675 (executing program) 2022/09/12 15:03:58 fetching corpus: 200, signal 59082/66254 (executing program) 2022/09/12 15:03:59 fetching corpus: 250, signal 63430/71734 (executing program) 2022/09/12 15:03:59 fetching corpus: 300, signal 72477/81556 (executing program) 2022/09/12 15:03:59 fetching corpus: 350, signal 78067/87999 (executing program) 2022/09/12 15:03:59 fetching corpus: 400, signal 83019/93747 (executing program) 2022/09/12 15:03:59 fetching corpus: 450, signal 87878/99340 (executing program) 2022/09/12 15:03:59 fetching corpus: 500, signal 91458/103747 (executing program) 2022/09/12 15:04:00 fetching corpus: 550, signal 95362/108347 (executing program) 2022/09/12 15:04:00 fetching corpus: 600, signal 98611/112275 (executing program) 2022/09/12 15:04:00 fetching corpus: 650, signal 102168/116340 (executing program) 2022/09/12 15:04:00 fetching corpus: 700, signal 105665/120426 (executing program) 2022/09/12 15:04:00 fetching corpus: 750, signal 108178/123599 (executing program) 2022/09/12 15:04:00 fetching corpus: 800, signal 110663/126620 (executing program) 2022/09/12 15:04:01 fetching corpus: 850, signal 112738/129298 (executing program) 2022/09/12 15:04:01 fetching corpus: 900, signal 115909/132832 (executing program) 2022/09/12 15:04:01 fetching corpus: 950, signal 117851/135317 (executing program) 2022/09/12 15:04:01 fetching corpus: 1000, signal 119672/137689 (executing program) 2022/09/12 15:04:01 fetching corpus: 1050, signal 122449/140734 (executing program) 2022/09/12 15:04:01 fetching corpus: 1100, signal 124398/143095 (executing program) 2022/09/12 15:04:01 fetching corpus: 1150, signal 126526/145562 (executing program) 2022/09/12 15:04:02 fetching corpus: 1200, signal 128356/147733 (executing program) 2022/09/12 15:04:02 fetching corpus: 1250, signal 130667/150253 (executing program) 2022/09/12 15:04:02 fetching corpus: 1300, signal 132597/152447 (executing program) 2022/09/12 15:04:02 fetching corpus: 1350, signal 134774/154767 (executing program) 2022/09/12 15:04:02 fetching corpus: 1400, signal 136680/156829 (executing program) 2022/09/12 15:04:02 fetching corpus: 1450, signal 137911/158460 (executing program) 2022/09/12 15:04:02 fetching corpus: 1500, signal 139973/160621 (executing program) 2022/09/12 15:04:03 fetching corpus: 1550, signal 141021/162061 (executing program) 2022/09/12 15:04:03 fetching corpus: 1600, signal 142027/163442 (executing program) 2022/09/12 15:04:03 fetching corpus: 1650, signal 142967/164731 (executing program) 2022/09/12 15:04:03 fetching corpus: 1700, signal 144605/166413 (executing program) 2022/09/12 15:04:03 fetching corpus: 1750, signal 145758/167839 (executing program) 2022/09/12 15:04:03 fetching corpus: 1800, signal 147014/169266 (executing program) 2022/09/12 15:04:03 fetching corpus: 1850, signal 148555/170859 (executing program) 2022/09/12 15:04:03 fetching corpus: 1900, signal 149563/172110 (executing program) 2022/09/12 15:04:04 fetching corpus: 1950, signal 151229/173749 (executing program) 2022/09/12 15:04:04 fetching corpus: 2000, signal 152510/175098 (executing program) 2022/09/12 15:04:04 fetching corpus: 2050, signal 154194/176669 (executing program) 2022/09/12 15:04:04 fetching corpus: 2100, signal 155535/178036 (executing program) 2022/09/12 15:04:04 fetching corpus: 2150, signal 156892/179352 (executing program) 2022/09/12 15:04:04 fetching corpus: 2200, signal 158121/180571 (executing program) 2022/09/12 15:04:04 fetching corpus: 2250, signal 159654/181926 (executing program) 2022/09/12 15:04:05 fetching corpus: 2300, signal 160841/183012 (executing program) 2022/09/12 15:04:05 fetching corpus: 2350, signal 161992/184165 (executing program) 2022/09/12 15:04:05 fetching corpus: 2400, signal 163130/185311 (executing program) 2022/09/12 15:04:05 fetching corpus: 2450, signal 164078/186257 (executing program) 2022/09/12 15:04:05 fetching corpus: 2500, signal 164819/187104 (executing program) 2022/09/12 15:04:05 fetching corpus: 2550, signal 166154/188249 (executing program) 2022/09/12 15:04:06 fetching corpus: 2600, signal 167621/189414 (executing program) 2022/09/12 15:04:06 fetching corpus: 2650, signal 169033/190541 (executing program) 2022/09/12 15:04:06 fetching corpus: 2700, signal 170375/191636 (executing program) 2022/09/12 15:04:06 fetching corpus: 2750, signal 171977/192951 (executing program) 2022/09/12 15:04:06 fetching corpus: 2800, signal 172832/193708 (executing program) 2022/09/12 15:04:06 fetching corpus: 2850, signal 174023/194665 (executing program) 2022/09/12 15:04:06 fetching corpus: 2900, signal 175122/195498 (executing program) 2022/09/12 15:04:06 fetching corpus: 2950, signal 176402/196420 (executing program) 2022/09/12 15:04:07 fetching corpus: 3000, signal 177266/197108 (executing program) 2022/09/12 15:04:07 fetching corpus: 3050, signal 178497/198077 (executing program) 2022/09/12 15:04:07 fetching corpus: 3100, signal 179521/198860 (executing program) 2022/09/12 15:04:07 fetching corpus: 3150, signal 180363/199532 (executing program) 2022/09/12 15:04:07 fetching corpus: 3200, signal 182026/200490 (executing program) 2022/09/12 15:04:07 fetching corpus: 3250, signal 182912/201115 (executing program) 2022/09/12 15:04:07 fetching corpus: 3300, signal 183711/201743 (executing program) 2022/09/12 15:04:08 fetching corpus: 3350, signal 184977/202484 (executing program) 2022/09/12 15:04:08 fetching corpus: 3400, signal 186013/203112 (executing program) 2022/09/12 15:04:08 fetching corpus: 3450, signal 187278/203768 (executing program) 2022/09/12 15:04:08 fetching corpus: 3500, signal 187876/204188 (executing program) 2022/09/12 15:04:08 fetching corpus: 3550, signal 188661/204662 (executing program) 2022/09/12 15:04:08 fetching corpus: 3600, signal 190276/205365 (executing program) 2022/09/12 15:04:09 fetching corpus: 3650, signal 191312/205918 (executing program) 2022/09/12 15:04:09 fetching corpus: 3700, signal 192506/206422 (executing program) 2022/09/12 15:04:09 fetching corpus: 3750, signal 193260/206783 (executing program) 2022/09/12 15:04:09 fetching corpus: 3800, signal 193916/207094 (executing program) 2022/09/12 15:04:09 fetching corpus: 3850, signal 195169/207577 (executing program) 2022/09/12 15:04:09 fetching corpus: 3900, signal 196432/208080 (executing program) 2022/09/12 15:04:10 fetching corpus: 3950, signal 196874/208360 (executing program) 2022/09/12 15:04:10 fetching corpus: 4000, signal 197527/208632 (executing program) 2022/09/12 15:04:10 fetching corpus: 4050, signal 198357/208975 (executing program) 2022/09/12 15:04:10 fetching corpus: 4100, signal 199059/209226 (executing program) 2022/09/12 15:04:10 fetching corpus: 4150, signal 199746/209647 (executing program) 2022/09/12 15:04:10 fetching corpus: 4200, signal 200781/209971 (executing program) 2022/09/12 15:04:10 fetching corpus: 4250, signal 201465/210202 (executing program) 2022/09/12 15:04:10 fetching corpus: 4300, signal 201895/210389 (executing program) 2022/09/12 15:04:11 fetching corpus: 4350, signal 202391/210593 (executing program) 2022/09/12 15:04:11 fetching corpus: 4400, signal 203121/210890 (executing program) 2022/09/12 15:04:11 fetching corpus: 4450, signal 203765/211107 (executing program) 2022/09/12 15:04:11 fetching corpus: 4482, signal 203981/211204 (executing program) 2022/09/12 15:04:11 fetching corpus: 4482, signal 203981/211285 (executing program) 2022/09/12 15:04:11 fetching corpus: 4482, signal 203981/211365 (executing program) 2022/09/12 15:04:11 fetching corpus: 4482, signal 203981/211453 (executing program) 2022/09/12 15:04:11 fetching corpus: 4482, signal 203981/211521 (executing program) 2022/09/12 15:04:11 fetching corpus: 4482, signal 203981/211601 (executing program) 2022/09/12 15:04:11 fetching corpus: 4482, signal 203981/211669 (executing program) 2022/09/12 15:04:11 fetching corpus: 4482, signal 203981/211761 (executing program) 2022/09/12 15:04:11 fetching corpus: 4482, signal 203981/211854 (executing program) 2022/09/12 15:04:11 fetching corpus: 4482, signal 203981/211925 (executing program) 2022/09/12 15:04:11 fetching corpus: 4482, signal 203981/212006 (executing program) 2022/09/12 15:04:11 fetching corpus: 4482, signal 203981/212075 (executing program) 2022/09/12 15:04:11 fetching corpus: 4482, signal 203981/212140 (executing program) 2022/09/12 15:04:11 fetching corpus: 4482, signal 203981/212140 (executing program) 2022/09/12 15:04:14 starting 8 fuzzer processes 15:04:14 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040), 0x4) 15:04:14 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0x0, 0xee01, 0xee00}}) 15:04:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 15:04:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) dup2(r0, r0) 15:04:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f00000001c0), 0x0) [ 70.279550] audit: type=1400 audit(1662995054.194:6): avc: denied { execmem } for pid=284 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 15:04:14 executing program 7: keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x0}) 15:04:14 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x80108906, 0x0) 15:04:14 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, &(0x7f0000000100)) [ 71.600602] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 71.603797] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 71.611465] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 71.613698] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 71.615426] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 71.617008] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 71.618365] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 71.619888] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 71.621297] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 71.622909] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 71.625044] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 71.626148] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 71.627155] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 71.628326] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 71.629416] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 71.630473] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 71.631591] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 71.633287] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 71.634477] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 71.636261] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 71.637401] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 71.638395] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 71.639997] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 71.641153] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 71.649678] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 71.653113] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 71.654386] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 71.656784] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 71.658724] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 71.659180] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 71.661928] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 71.661934] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 71.663164] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 71.664223] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 71.665579] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 71.667462] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 71.670903] Bluetooth: hci4: HCI_REQ-0x0c1a [ 71.690426] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 71.692053] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 71.693913] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 71.698988] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 71.700683] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 71.701993] Bluetooth: hci0: HCI_REQ-0x0c1a [ 71.703496] Bluetooth: hci6: HCI_REQ-0x0c1a [ 71.706706] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 71.714725] Bluetooth: hci2: HCI_REQ-0x0c1a [ 71.716092] Bluetooth: hci1: HCI_REQ-0x0c1a [ 71.736455] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 71.738242] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 71.740120] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 71.749018] Bluetooth: hci3: HCI_REQ-0x0c1a [ 71.750018] Bluetooth: hci5: HCI_REQ-0x0c1a [ 71.767219] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 71.785081] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 71.786617] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 71.801997] Bluetooth: hci7: HCI_REQ-0x0c1a [ 73.716404] Bluetooth: hci0: command 0x0409 tx timeout [ 73.717276] Bluetooth: hci6: command 0x0409 tx timeout [ 73.719753] Bluetooth: hci4: command 0x0409 tx timeout [ 73.779951] Bluetooth: hci3: command 0x0409 tx timeout [ 73.780437] Bluetooth: hci5: command 0x0409 tx timeout [ 73.780871] Bluetooth: hci1: command 0x0409 tx timeout [ 73.781271] Bluetooth: hci2: command 0x0409 tx timeout [ 73.843924] Bluetooth: hci7: command 0x0409 tx timeout [ 75.764216] Bluetooth: hci4: command 0x041b tx timeout [ 75.766524] Bluetooth: hci6: command 0x041b tx timeout [ 75.767214] Bluetooth: hci0: command 0x041b tx timeout [ 75.827902] Bluetooth: hci2: command 0x041b tx timeout [ 75.828522] Bluetooth: hci1: command 0x041b tx timeout [ 75.831166] Bluetooth: hci5: command 0x041b tx timeout [ 75.831726] Bluetooth: hci3: command 0x041b tx timeout [ 75.891864] Bluetooth: hci7: command 0x041b tx timeout [ 77.811878] Bluetooth: hci0: command 0x040f tx timeout [ 77.812510] Bluetooth: hci6: command 0x040f tx timeout [ 77.814064] Bluetooth: hci4: command 0x040f tx timeout [ 77.875880] Bluetooth: hci3: command 0x040f tx timeout [ 77.876542] Bluetooth: hci5: command 0x040f tx timeout [ 77.878237] Bluetooth: hci1: command 0x040f tx timeout [ 77.879565] Bluetooth: hci2: command 0x040f tx timeout [ 77.939874] Bluetooth: hci7: command 0x040f tx timeout [ 79.859898] Bluetooth: hci4: command 0x0419 tx timeout [ 79.860396] Bluetooth: hci6: command 0x0419 tx timeout [ 79.861857] Bluetooth: hci0: command 0x0419 tx timeout [ 79.923884] Bluetooth: hci2: command 0x0419 tx timeout [ 79.924366] Bluetooth: hci1: command 0x0419 tx timeout [ 79.924780] Bluetooth: hci5: command 0x0419 tx timeout [ 79.925643] Bluetooth: hci3: command 0x0419 tx timeout [ 79.987862] Bluetooth: hci7: command 0x0419 tx timeout 15:05:07 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x80108906, 0x0) 15:05:08 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0x0, 0xee01, 0xee00}}) 15:05:08 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x80108906, 0x0) 15:05:08 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0x0, 0xee01, 0xee00}}) 15:05:08 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0x0, 0xee01, 0xee00}}) 15:05:08 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x80108906, 0x0) 15:05:08 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0x0, 0xee01, 0xee00}}) 15:05:08 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = gettid() r2 = gettid() r3 = socket$packet(0x11, 0x2, 0x300) kcmp(r1, r2, 0x0, r0, r3) [ 125.576438] syz-executor.2 (3963) used greatest stack depth: 23880 bytes left 15:05:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040), 0x4) 15:05:09 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fdatasync(r2) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) fchown(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) open_tree(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 15:05:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f00000001c0), 0x0) 15:05:09 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0x0, 0xee01, 0xee00}}) 15:05:09 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0x0, 0xee01, 0xee00}}) 15:05:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = gettid() r2 = gettid() r3 = socket$packet(0x11, 0x2, 0x300) kcmp(r1, r2, 0x0, r0, r3) 15:05:09 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) dup3(r0, r1, 0x0) 15:05:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 15:05:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = gettid() r2 = gettid() r3 = socket$packet(0x11, 0x2, 0x300) kcmp(r1, r2, 0x0, r0, r3) [ 125.899224] loop6: detected capacity change from 0 to 40 15:05:09 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) dup3(r0, r1, 0x0) 15:05:09 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 15:05:09 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = gettid() r2 = gettid() r3 = socket$packet(0x11, 0x2, 0x300) kcmp(r1, r2, 0x0, r0, r3) [ 125.962257] audit: type=1400 audit(1662995109.876:7): avc: denied { open } for pid=3990 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 125.963719] audit: type=1400 audit(1662995109.877:8): avc: denied { kernel } for pid=3990 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 125.984371] ------------[ cut here ]------------ [ 125.984392] [ 125.984395] ====================================================== [ 125.984398] WARNING: possible circular locking dependency detected [ 125.984403] 6.0.0-rc5-next-20220912 #1 Not tainted [ 125.984410] ------------------------------------------------------ [ 125.984413] syz-executor.3/3991 is trying to acquire lock: [ 125.984420] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 125.984457] [ 125.984457] but task is already holding lock: [ 125.984460] ffff88800cfe9420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 125.984488] [ 125.984488] which lock already depends on the new lock. [ 125.984488] [ 125.984492] [ 125.984492] the existing dependency chain (in reverse order) is: [ 125.984495] [ 125.984495] -> #3 (&ctx->lock){....}-{2:2}: [ 125.984509] _raw_spin_lock+0x2a/0x40 [ 125.984526] __perf_event_task_sched_out+0x53b/0x18d0 [ 125.984539] __schedule+0xedd/0x2470 [ 125.984549] schedule+0xda/0x1b0 [ 125.984558] exit_to_user_mode_prepare+0x114/0x1a0 [ 125.984579] syscall_exit_to_user_mode+0x19/0x40 [ 125.984597] do_syscall_64+0x48/0x90 [ 125.984610] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 125.984628] [ 125.984628] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 125.984642] _raw_spin_lock_nested+0x30/0x40 [ 125.984656] raw_spin_rq_lock_nested+0x1e/0x30 [ 125.984670] task_fork_fair+0x63/0x4d0 [ 125.984687] sched_cgroup_fork+0x3d0/0x540 [ 125.984701] copy_process+0x3f9e/0x6df0 [ 125.984712] kernel_clone+0xe7/0x890 [ 125.984722] user_mode_thread+0xad/0xf0 [ 125.984732] rest_init+0x24/0x250 [ 125.984748] arch_call_rest_init+0xf/0x14 [ 125.984767] start_kernel+0x4c1/0x4e6 [ 125.984784] secondary_startup_64_no_verify+0xe0/0xeb [ 125.984799] [ 125.984799] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 125.984815] _raw_spin_lock_irqsave+0x39/0x60 [ 125.984830] try_to_wake_up+0xab/0x1920 [ 125.984844] up+0x75/0xb0 [ 125.984855] __up_console_sem+0x6e/0x80 [ 125.984872] console_unlock+0x46a/0x590 [ 125.984888] vprintk_emit+0x1bd/0x560 [ 125.984905] vprintk+0x84/0xa0 [ 125.984921] _printk+0xba/0xf1 [ 125.984939] kauditd_hold_skb.cold+0x3f/0x4e [ 125.984953] kauditd_send_queue+0x233/0x290 [ 125.984968] kauditd_thread+0x5da/0x9a0 [ 125.984982] kthread+0x2ed/0x3a0 [ 125.984997] ret_from_fork+0x22/0x30 [ 125.985010] [ 125.985010] -> #0 ((console_sem).lock){....}-{2:2}: [ 125.985023] __lock_acquire+0x2a02/0x5e70 [ 125.985040] lock_acquire+0x1a2/0x530 [ 125.985056] _raw_spin_lock_irqsave+0x39/0x60 [ 125.985071] down_trylock+0xe/0x70 [ 125.985083] __down_trylock_console_sem+0x3b/0xd0 [ 125.985100] vprintk_emit+0x16b/0x560 [ 125.985116] vprintk+0x84/0xa0 [ 125.985133] _printk+0xba/0xf1 [ 125.985149] report_bug.cold+0x72/0xab [ 125.985162] handle_bug+0x3c/0x70 [ 125.985174] exc_invalid_op+0x14/0x50 [ 125.985187] asm_exc_invalid_op+0x16/0x20 [ 125.985203] group_sched_out.part.0+0x2c7/0x460 [ 125.985214] ctx_sched_out+0x8f1/0xc10 [ 125.985223] __perf_event_task_sched_out+0x6d0/0x18d0 [ 125.985235] __schedule+0xedd/0x2470 [ 125.985245] schedule+0xda/0x1b0 [ 125.985254] exit_to_user_mode_prepare+0x114/0x1a0 [ 125.985273] syscall_exit_to_user_mode+0x19/0x40 [ 125.985290] do_syscall_64+0x48/0x90 [ 125.985303] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 125.985319] [ 125.985319] other info that might help us debug this: [ 125.985319] [ 125.985322] Chain exists of: [ 125.985322] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 125.985322] [ 125.985337] Possible unsafe locking scenario: [ 125.985337] [ 125.985339] CPU0 CPU1 [ 125.985342] ---- ---- [ 125.985344] lock(&ctx->lock); [ 125.985350] lock(&rq->__lock); [ 125.985356] lock(&ctx->lock); [ 125.985363] lock((console_sem).lock); [ 125.985368] [ 125.985368] *** DEADLOCK *** [ 125.985368] [ 125.985370] 2 locks held by syz-executor.3/3991: [ 125.985377] #0: ffff88806cf37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 125.985402] #1: ffff88800cfe9420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 125.985430] [ 125.985430] stack backtrace: [ 125.985433] CPU: 1 PID: 3991 Comm: syz-executor.3 Not tainted 6.0.0-rc5-next-20220912 #1 [ 125.985446] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 125.985454] Call Trace: [ 125.985458] [ 125.985462] dump_stack_lvl+0x8b/0xb3 [ 125.985476] check_noncircular+0x263/0x2e0 [ 125.985493] ? format_decode+0x26c/0xb50 [ 125.985508] ? print_circular_bug+0x450/0x450 [ 125.985525] ? enable_ptr_key_workfn+0x20/0x20 [ 125.985540] ? format_decode+0x26c/0xb50 [ 125.985555] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 125.985573] __lock_acquire+0x2a02/0x5e70 [ 125.985596] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 125.985618] lock_acquire+0x1a2/0x530 [ 125.985635] ? down_trylock+0xe/0x70 [ 125.985650] ? rcu_read_unlock+0x40/0x40 [ 125.985671] ? vprintk+0x84/0xa0 [ 125.985690] _raw_spin_lock_irqsave+0x39/0x60 [ 125.985705] ? down_trylock+0xe/0x70 [ 125.985719] down_trylock+0xe/0x70 [ 125.985732] ? vprintk+0x84/0xa0 [ 125.985750] __down_trylock_console_sem+0x3b/0xd0 [ 125.985767] vprintk_emit+0x16b/0x560 [ 125.985787] vprintk+0x84/0xa0 [ 125.985805] _printk+0xba/0xf1 [ 125.985823] ? record_print_text.cold+0x16/0x16 [ 125.985845] ? report_bug.cold+0x66/0xab [ 125.985859] ? group_sched_out.part.0+0x2c7/0x460 [ 125.985870] report_bug.cold+0x72/0xab [ 125.985885] handle_bug+0x3c/0x70 [ 125.985898] exc_invalid_op+0x14/0x50 [ 125.985912] asm_exc_invalid_op+0x16/0x20 [ 125.985929] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 125.985943] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 125.985955] RSP: 0018:ffff88804146fc48 EFLAGS: 00010006 [ 125.985964] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 125.985972] RDX: ffff88803f128000 RSI: ffffffff81566027 RDI: 0000000000000005 [ 125.985980] RBP: ffff888041478000 R08: 0000000000000005 R09: 0000000000000001 [ 125.985987] R10: 0000000000000000 R11: ffffffff865aa05b R12: ffff88800cfe9400 [ 125.985995] R13: ffff88806cf3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 125.986006] ? group_sched_out.part.0+0x2c7/0x460 [ 125.986019] ? group_sched_out.part.0+0x2c7/0x460 [ 125.986032] ctx_sched_out+0x8f1/0xc10 [ 125.986045] __perf_event_task_sched_out+0x6d0/0x18d0 [ 125.986060] ? lock_is_held_type+0xd7/0x130 [ 125.986079] ? __perf_cgroup_move+0x160/0x160 [ 125.986091] ? set_next_entity+0x304/0x550 [ 125.986109] ? update_curr+0x267/0x740 [ 125.986127] ? lock_is_held_type+0xd7/0x130 [ 125.986146] __schedule+0xedd/0x2470 [ 125.986159] ? io_schedule_timeout+0x150/0x150 [ 125.986171] ? rcu_read_lock_sched_held+0x3e/0x80 [ 125.986192] schedule+0xda/0x1b0 [ 125.986203] exit_to_user_mode_prepare+0x114/0x1a0 [ 125.986224] syscall_exit_to_user_mode+0x19/0x40 [ 125.986242] do_syscall_64+0x48/0x90 [ 125.986256] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 125.986273] RIP: 0033:0x7f2aca4feb19 [ 125.986282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 125.986293] RSP: 002b:00007f2ac7a74218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 125.986303] RAX: 0000000000000001 RBX: 00007f2aca611f68 RCX: 00007f2aca4feb19 [ 125.986311] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f2aca611f6c [ 125.986319] RBP: 00007f2aca611f60 R08: 000000000000000e R09: 0000000000000000 [ 125.986326] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f2aca611f6c [ 125.986333] R13: 00007ffe964d9d3f R14: 00007f2ac7a74300 R15: 0000000000022000 [ 125.986346] [ 126.020827] hrtimer: interrupt took 18094 ns [ 126.020978] WARNING: CPU: 1 PID: 3991 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 126.043029] Modules linked in: [ 126.043279] CPU: 1 PID: 3991 Comm: syz-executor.3 Not tainted 6.0.0-rc5-next-20220912 #1 [ 126.043875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 126.044706] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 126.045106] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 126.046443] RSP: 0018:ffff88804146fc48 EFLAGS: 00010006 [ 126.046839] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 126.047368] RDX: ffff88803f128000 RSI: ffffffff81566027 RDI: 0000000000000005 [ 126.047876] RBP: ffff888041478000 R08: 0000000000000005 R09: 0000000000000001 [ 126.048370] R10: 0000000000000000 R11: ffffffff865aa05b R12: ffff88800cfe9400 [ 126.048867] R13: ffff88806cf3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 126.049366] FS: 00007f2ac7a74700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 126.049950] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 126.050377] CR2: 00007f37710aa3a4 CR3: 000000001d9b6000 CR4: 0000000000350ee0 [ 126.050920] Call Trace: [ 126.051111] [ 126.051292] ctx_sched_out+0x8f1/0xc10 [ 126.051592] __perf_event_task_sched_out+0x6d0/0x18d0 [ 126.051981] ? lock_is_held_type+0xd7/0x130 [ 126.052318] ? __perf_cgroup_move+0x160/0x160 [ 126.052652] ? set_next_entity+0x304/0x550 [ 126.052981] ? update_curr+0x267/0x740 [ 126.053283] ? lock_is_held_type+0xd7/0x130 [ 126.053613] __schedule+0xedd/0x2470 [ 126.053900] ? io_schedule_timeout+0x150/0x150 [ 126.054248] ? rcu_read_lock_sched_held+0x3e/0x80 [ 126.054612] schedule+0xda/0x1b0 [ 126.054881] exit_to_user_mode_prepare+0x114/0x1a0 [ 126.055260] syscall_exit_to_user_mode+0x19/0x40 [ 126.055621] do_syscall_64+0x48/0x90 [ 126.055911] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.056301] RIP: 0033:0x7f2aca4feb19 [ 126.056578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.057923] RSP: 002b:00007f2ac7a74218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 126.058476] RAX: 0000000000000001 RBX: 00007f2aca611f68 RCX: 00007f2aca4feb19 [ 126.059004] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f2aca611f6c [ 126.059534] RBP: 00007f2aca611f60 R08: 000000000000000e R09: 0000000000000000 [ 126.060064] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f2aca611f6c [ 126.060584] R13: 00007ffe964d9d3f R14: 00007f2ac7a74300 R15: 0000000000022000 [ 126.061119] [ 126.061296] irq event stamp: 740 [ 126.061543] hardirqs last enabled at (739): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 126.062243] hardirqs last disabled at (740): [] __schedule+0x1225/0x2470 [ 126.062858] softirqs last enabled at (502): [] __irq_exit_rcu+0x11b/0x180 [ 126.063495] softirqs last disabled at (493): [] __irq_exit_rcu+0x11b/0x180 [ 126.064137] ---[ end trace 0000000000000000 ]--- [ 126.126913] audit: type=1400 audit(1662995110.041:9): avc: denied { write } for pid=3990 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 126.673829] syz-executor.6: attempt to access beyond end of device [ 126.673829] loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 126.678871] Buffer I/O error on dev loop6, logical block 10, lost async page write [ 126.727987] syz-executor.6: attempt to access beyond end of device [ 126.727987] loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 126.729721] Buffer I/O error on dev loop6, logical block 10, lost async page write 15:05:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040), 0x4) 15:05:10 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) dup3(r0, r1, 0x0) 15:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 15:05:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000180), 0x20) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffffe, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7fffffff) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r3, 0x6628) sendfile(r0, r0, 0x0, 0x100000) 15:05:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f00000001c0), 0x0) 15:05:10 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 15:05:10 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fdatasync(r2) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) fchown(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) open_tree(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 15:05:10 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) [ 127.090561] loop6: detected capacity change from 0 to 40 15:05:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f00000001c0), 0x0) 15:05:11 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) dup3(r0, r1, 0x0) 15:05:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040), 0x4) 15:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 15:05:11 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 15:05:11 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fdatasync(r2) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) fchown(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) open_tree(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 15:05:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000180), 0x20) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffffe, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7fffffff) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r3, 0x6628) sendfile(r0, r0, 0x0, 0x100000) 15:05:11 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) [ 128.087666] loop6: detected capacity change from 0 to 40 15:05:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fdatasync(r2) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) fchown(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) open_tree(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 128.203480] loop4: detected capacity change from 0 to 40 [ 128.308482] syz-executor.6: attempt to access beyond end of device [ 128.308482] loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 128.310223] Buffer I/O error on dev loop6, logical block 10, lost async page write 15:05:12 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 15:05:12 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 15:05:12 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 15:05:12 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 15:05:12 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fdatasync(r2) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) fchown(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) open_tree(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 15:05:12 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) [ 128.484579] loop6: detected capacity change from 0 to 40 15:05:12 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) [ 128.545625] syz-executor.4: attempt to access beyond end of device [ 128.545625] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 128.547135] Buffer I/O error on dev loop4, logical block 10, lost async page write 15:05:12 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060082003c00000000000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000007ffe900e90a000008000600020000000800040000007e000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623d42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e2ff669f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) [ 128.760232] syz-executor.6: attempt to access beyond end of device [ 128.760232] loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 128.761865] Buffer I/O error on dev loop6, logical block 10, lost async page write 15:05:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000002, 0x401a012, r1, 0x0) pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 15:05:12 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="000427bdabc5ff0000005c000180060004004e23000008002f82950e12d57ad088af20125890dfb9080000020000060004004e230000060082003c00000000000300ff0200000000000000000000000000010c000700200000000100000008000b007369700008000b0073697000060004004e23000007ffe900e90a000008000600020000000800040000007e000800040000210000355c9656f35fdeb7bb961620a0dae802be9f8b74623d42c9bd892fae0aca9f4cee9ce3e2f090f7dcdede6da696d02d3c99137bf2594599b85fa71274d6254704d7bbfdc328a68b82cd0aef0f9c79e2ff669f773f1de1675f18b4af2d804e4ca7912750e0ab515aff130f483b9cad80f41ebf4cc9caea11eae445e79c2b60717a98bc5ef854a8052b2b37acfa7277ced458f939ac2ea170d1c1a2e5760428edadf9d905a4b3f09f09881ca89f7f9096d91beffa584b8d2e7cc5102f09d8868d245590f811541c9d52eec7984fd86c"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 15:05:12 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 15:05:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fdatasync(r2) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) fchown(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) open_tree(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 15:05:12 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 15:05:12 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x7, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) io_setup(0x6, &(0x7f0000000380)) syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') 15:05:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000180), 0x20) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffffe, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7fffffff) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r3, 0x6628) sendfile(r0, r0, 0x0, 0x100000) 15:05:12 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x400448cb, 0x0) [ 128.986000] loop4: detected capacity change from 0 to 40 15:05:12 executing program 3: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 15:05:12 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x7, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) io_setup(0x6, &(0x7f0000000380)) syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') 15:05:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000002, 0x401a012, r1, 0x0) pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 15:05:12 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000eadfd9107efe0600033726abdb53857cb50c", @ANYRES16=0x0, @ANYBLOB="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"], 0x90}, 0x1, 0x0, 0x0, 0x22000850}, 0x4040) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251300000000000000255c00a834bb1700"], 0x1c}, 0x1, 0x0, 0x0, 0x44085}, 0x8001) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) [ 129.128530] syz-executor.4: attempt to access beyond end of device [ 129.128530] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 129.129560] Buffer I/O error on dev loop4, logical block 10, lost async page write 15:05:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000002, 0x401a012, r1, 0x0) pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 15:05:13 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x7, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) io_setup(0x6, &(0x7f0000000380)) syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') 15:05:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000180), 0x20) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffffe, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x7fffffff) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r3, 0x6628) sendfile(r0, r0, 0x0, 0x100000) 15:05:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000002, 0x401a012, r1, 0x0) pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 15:05:13 executing program 0: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000280), r0) 15:05:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000002, 0x401a012, r1, 0x0) pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 15:05:13 executing program 3: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 15:05:13 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x7, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) io_setup(0x6, &(0x7f0000000380)) syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') 15:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x3, 0x80000, 0x8000000) 15:05:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fdatasync(r2) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) fchown(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) open_tree(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 129.913295] loop4: detected capacity change from 0 to 40 15:05:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f00000004c0)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)=0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000500)={{0x107, 0x1, 0x78, 0x2e, 0xda, 0xfffffffd, 0x21f, 0x9}, "f8cee6ff2323", ['\x00', '\x00', '\x00', '\x00']}, 0x426) r1 = clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x6, 0x1, 0x70, 0x7, 0x0, 0x7, 0x14400, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_config_ext={0x3, 0xfff}, 0x0, 0x80000000, 0xffff0cea, 0x1, 0x5, 0x2, 0x1ff, 0x0, 0x3ff, 0x0, 0x1}, r1, 0xfffffffdffffffff, 0xffffffffffffffff, 0x2) r2 = inotify_init() fcntl$setstatus(r2, 0x4, 0x2800) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r2, 0x80489439, &(0x7f0000000180)) 15:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x3, 0x80000, 0x8000000) 15:05:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000002, 0x401a012, r1, 0x0) pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 15:05:14 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4e002241}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_SEC_DEVICE={0x14, 0x23, 0x0, 0x1, [@NL802154_DEV_ATTR_SHORT_ADDR={0x6, 0x3, 0xaaa1}, @NL802154_DEV_ATTR_SHORT_ADDR={0x6}]}, @NL802154_ATTR_SEC_DEVICE={0x28, 0x23, 0x0, 0x1, [@NL802154_DEV_ATTR_PAN_ID={0x6, 0x2, 0x3}, @NL802154_DEV_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEV_ATTR_FRAME_COUNTER={0x6, 0x1, 0x8}, @NL802154_DEV_ATTR_PAN_ID={0x6, 0x2, 0x1}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x44800}, 0x240000c1) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000001c0)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEV(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x68}, 0x1, 0x0, 0x0, 0x40047}, 0x8000) getuid() sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000001740)={&(0x7f0000001640), 0xc, &(0x7f0000001700)={&(0x7f00000016c0)={0x20, 0x0, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x44000000) 15:05:14 executing program 3: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 15:05:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x3, 0x80000, 0x8000000) 15:05:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000002, 0x401a012, r1, 0x0) pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 15:05:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x3, 0x80000, 0x8000000) 15:05:14 executing program 6: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) 15:05:14 executing program 3: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 15:05:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 15:05:14 executing program 5: r0 = eventfd(0x0) write(r0, &(0x7f0000000000)="65eeed874f8fadae", 0x8) write(r0, &(0x7f0000000400)="7afcd521dc9e0dce", 0x8) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) 15:05:14 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000001c0)=')', 0x1}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_JOIN_IBSS(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x90, r3, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_KEYS={0x70, 0x51, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "30e715c4d87ed76622e9b3047d"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "1d3a8988a8"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "58705442a5479fd1269756a6ae"}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_SEQ={0x5, 0x4, "86"}, @NL80211_KEY_IDX={0x5, 0x2, 0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "67e3aef484"}]}]}, @NL80211_ATTR_HIDDEN_SSID={0xb, 0x7e, @random="ce9e42f57c8a02"}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x4850) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) close(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r6, &(0x7f0000000080)="01", 0x41030) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 15:05:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f00000004c0)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)=0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000500)={{0x107, 0x1, 0x78, 0x2e, 0xda, 0xfffffffd, 0x21f, 0x9}, "f8cee6ff2323", ['\x00', '\x00', '\x00', '\x00']}, 0x426) r1 = clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x6, 0x1, 0x70, 0x7, 0x0, 0x7, 0x14400, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_config_ext={0x3, 0xfff}, 0x0, 0x80000000, 0xffff0cea, 0x1, 0x5, 0x2, 0x1ff, 0x0, 0x3ff, 0x0, 0x1}, r1, 0xfffffffdffffffff, 0xffffffffffffffff, 0x2) r2 = inotify_init() fcntl$setstatus(r2, 0x4, 0x2800) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r2, 0x80489439, &(0x7f0000000180)) [ 130.988403] loop1: detected capacity change from 0 to 128 15:05:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f80100200040000000000000000000800029a0ec11f153595a4b414c4c4552202046415431322020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ffff00f0ffffffff078000ffffff00"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="f8ffff00f0ffffffff078000ffffff00"/32, 0x20, 0x400}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000c1e670325132510000e670325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c45312020202020202000c1e670325132510000e670325105000a00000041660069006c00650032000f00140000ffffffffffffffffffff0000ffffffff46494c45322020202020202000c1e670325132510000e670325106002823000041660069006c0065002e000f00d263006f006c0064000000ffff0000ffffffff46494c457e312020434f4c2000c1e670325132510000e6703251090064000000", 0x120, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e670325132510000e67032510300000000002e2e2020202020202020201000c1e670325132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000c1e670325132510000e670325104001a040000", 0x80, 0x1e00}, {&(0x7f0000010600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x2e00}, {&(0x7f0000010b00)='syzkallers\x00'/32, 0x20, 0x3e00}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x7e00}], 0x0, &(0x7f0000010d00)) 15:05:14 executing program 6: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) 15:05:14 executing program 6: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) 15:05:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)='=', 0x1, 0x44891, 0x0, 0x0) [ 131.126840] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 131.127741] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 131.128435] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 131.129076] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 131.129759] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 4 prio class 2 [ 131.134364] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.134932] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.135652] Buffer I/O error on dev sr0, logical block 0, async page read [ 131.136578] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.137080] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.137803] Buffer I/O error on dev sr0, logical block 1, async page read [ 131.138729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.139258] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.140004] Buffer I/O error on dev sr0, logical block 2, async page read [ 131.140999] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.141471] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.142262] Buffer I/O error on dev sr0, logical block 3, async page read [ 131.143227] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.143702] I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.144738] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.145255] I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.146248] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.146735] I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 131.147799] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 131.148315] I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 15:05:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)='=', 0x1, 0x44891, 0x0, 0x0) 15:05:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)='=', 0x1, 0x44891, 0x0, 0x0) 15:05:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 15:05:15 executing program 6: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) 15:05:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 15:05:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)='=', 0x1, 0x44891, 0x0, 0x0) 15:05:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 15:05:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 15:05:15 executing program 5: r0 = eventfd(0x0) write(r0, &(0x7f0000000000)="65eeed874f8fadae", 0x8) write(r0, &(0x7f0000000400)="7afcd521dc9e0dce", 0x8) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) 15:05:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 15:05:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000001c0)=')', 0x1}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_JOIN_IBSS(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x90, r3, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_KEYS={0x70, 0x51, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "30e715c4d87ed76622e9b3047d"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "1d3a8988a8"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "58705442a5479fd1269756a6ae"}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_SEQ={0x5, 0x4, "86"}, @NL80211_KEY_IDX={0x5, 0x2, 0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "67e3aef484"}]}]}, @NL80211_ATTR_HIDDEN_SSID={0xb, 0x7e, @random="ce9e42f57c8a02"}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x4850) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) close(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r6, &(0x7f0000000080)="01", 0x41030) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 15:05:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 15:05:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f00000004c0)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)=0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000500)={{0x107, 0x1, 0x78, 0x2e, 0xda, 0xfffffffd, 0x21f, 0x9}, "f8cee6ff2323", ['\x00', '\x00', '\x00', '\x00']}, 0x426) r1 = clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x6, 0x1, 0x70, 0x7, 0x0, 0x7, 0x14400, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_config_ext={0x3, 0xfff}, 0x0, 0x80000000, 0xffff0cea, 0x1, 0x5, 0x2, 0x1ff, 0x0, 0x3ff, 0x0, 0x1}, r1, 0xfffffffdffffffff, 0xffffffffffffffff, 0x2) r2 = inotify_init() fcntl$setstatus(r2, 0x4, 0x2800) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r2, 0x80489439, &(0x7f0000000180)) 15:05:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 15:05:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 15:05:15 executing program 6: r0 = eventfd(0x0) write(r0, &(0x7f0000000000)="65eeed874f8fadae", 0x8) write(r0, &(0x7f0000000400)="7afcd521dc9e0dce", 0x8) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) 15:05:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 15:05:15 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000001c0)=')', 0x1}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_JOIN_IBSS(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x90, r3, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_KEYS={0x70, 0x51, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "30e715c4d87ed76622e9b3047d"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "1d3a8988a8"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "58705442a5479fd1269756a6ae"}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_SEQ={0x5, 0x4, "86"}, @NL80211_KEY_IDX={0x5, 0x2, 0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "67e3aef484"}]}]}, @NL80211_ATTR_HIDDEN_SSID={0xb, 0x7e, @random="ce9e42f57c8a02"}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x4850) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) close(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r6, &(0x7f0000000080)="01", 0x41030) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 15:05:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) [ 132.076285] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 132.077329] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 132.078056] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 132.078726] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 132.079522] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 3 prio class 2 [ 132.086082] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.086664] buffer_io_error: 4 callbacks suppressed [ 132.086674] Buffer I/O error on dev sr0, logical block 0, async page read [ 132.090575] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.091190] Buffer I/O error on dev sr0, logical block 1, async page read [ 132.092751] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.093456] Buffer I/O error on dev sr0, logical block 2, async page read [ 132.098268] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.098910] Buffer I/O error on dev sr0, logical block 3, async page read 15:05:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000001c0)=')', 0x1}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_JOIN_IBSS(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x90, r3, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_KEYS={0x70, 0x51, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "30e715c4d87ed76622e9b3047d"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "1d3a8988a8"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "58705442a5479fd1269756a6ae"}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_SEQ={0x5, 0x4, "86"}, @NL80211_KEY_IDX={0x5, 0x2, 0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "67e3aef484"}]}]}, @NL80211_ATTR_HIDDEN_SSID={0xb, 0x7e, @random="ce9e42f57c8a02"}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x4850) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) close(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r6, &(0x7f0000000080)="01", 0x41030) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) [ 132.103717] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.104335] Buffer I/O error on dev sr0, logical block 4, async page read [ 132.112121] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.112735] Buffer I/O error on dev sr0, logical block 5, async page read [ 132.117700] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.118423] Buffer I/O error on dev sr0, logical block 6, async page read [ 132.120955] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.121547] Buffer I/O error on dev sr0, logical block 7, async page read 15:05:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 15:05:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000001c0)=')', 0x1}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_JOIN_IBSS(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x90, r3, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_KEYS={0x70, 0x51, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "30e715c4d87ed76622e9b3047d"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "1d3a8988a8"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "58705442a5479fd1269756a6ae"}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_SEQ={0x5, 0x4, "86"}, @NL80211_KEY_IDX={0x5, 0x2, 0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "67e3aef484"}]}]}, @NL80211_ATTR_HIDDEN_SSID={0xb, 0x7e, @random="ce9e42f57c8a02"}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x4850) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) close(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r6, &(0x7f0000000080)="01", 0x41030) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) [ 132.207365] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.207838] Buffer I/O error on dev sr0, logical block 0, async page read [ 132.208600] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.209072] Buffer I/O error on dev sr0, logical block 1, async page read [ 132.209846] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.210440] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.211162] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.211739] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.212406] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.213263] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 15:05:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000001c0)=')', 0x1}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_JOIN_IBSS(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x90, r3, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_KEYS={0x70, 0x51, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "30e715c4d87ed76622e9b3047d"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "1d3a8988a8"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "58705442a5479fd1269756a6ae"}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_SEQ={0x5, 0x4, "86"}, @NL80211_KEY_IDX={0x5, 0x2, 0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "67e3aef484"}]}]}, @NL80211_ATTR_HIDDEN_SSID={0xb, 0x7e, @random="ce9e42f57c8a02"}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x4850) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) close(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r6, &(0x7f0000000080)="01", 0x41030) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 15:05:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r0 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) [ 132.459966] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 132.497400] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 15:05:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000001c0)=')', 0x1}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_JOIN_IBSS(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x90, r3, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_KEYS={0x70, 0x51, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "30e715c4d87ed76622e9b3047d"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "1d3a8988a8"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "58705442a5479fd1269756a6ae"}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_SEQ={0x5, 0x4, "86"}, @NL80211_KEY_IDX={0x5, 0x2, 0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "67e3aef484"}]}]}, @NL80211_ATTR_HIDDEN_SSID={0xb, 0x7e, @random="ce9e42f57c8a02"}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x4850) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) close(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r6, &(0x7f0000000080)="01", 0x41030) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 15:05:16 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000001c0)=')', 0x1}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_JOIN_IBSS(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x90, r3, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_KEYS={0x70, 0x51, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "30e715c4d87ed76622e9b3047d"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "1d3a8988a8"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "58705442a5479fd1269756a6ae"}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_SEQ={0x5, 0x4, "86"}, @NL80211_KEY_IDX={0x5, 0x2, 0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "67e3aef484"}]}]}, @NL80211_ATTR_HIDDEN_SSID={0xb, 0x7e, @random="ce9e42f57c8a02"}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x4850) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) close(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r6, &(0x7f0000000080)="01", 0x41030) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 15:05:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000001c0)=')', 0x1}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_JOIN_IBSS(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x90, r3, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_KEYS={0x70, 0x51, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "30e715c4d87ed76622e9b3047d"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "1d3a8988a8"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "58705442a5479fd1269756a6ae"}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_SEQ={0x5, 0x4, "86"}, @NL80211_KEY_IDX={0x5, 0x2, 0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "67e3aef484"}]}]}, @NL80211_ATTR_HIDDEN_SSID={0xb, 0x7e, @random="ce9e42f57c8a02"}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x4850) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) close(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r6, &(0x7f0000000080)="01", 0x41030) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 15:05:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000001c0)=')', 0x1}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_JOIN_IBSS(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x90, r3, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_KEYS={0x70, 0x51, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "30e715c4d87ed76622e9b3047d"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "1d3a8988a8"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "58705442a5479fd1269756a6ae"}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_SEQ={0x5, 0x4, "86"}, @NL80211_KEY_IDX={0x5, 0x2, 0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "67e3aef484"}]}]}, @NL80211_ATTR_HIDDEN_SSID={0xb, 0x7e, @random="ce9e42f57c8a02"}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x4850) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) close(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r6, &(0x7f0000000080)="01", 0x41030) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 15:05:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000001c0)=')', 0x1}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_JOIN_IBSS(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x90, r3, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_KEYS={0x70, 0x51, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "30e715c4d87ed76622e9b3047d"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "1d3a8988a8"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "58705442a5479fd1269756a6ae"}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_SEQ={0x5, 0x4, "86"}, @NL80211_KEY_IDX={0x5, 0x2, 0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "67e3aef484"}]}]}, @NL80211_ATTR_HIDDEN_SSID={0xb, 0x7e, @random="ce9e42f57c8a02"}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x4850) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) close(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r6, &(0x7f0000000080)="01", 0x41030) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 15:05:16 executing program 5: r0 = eventfd(0x0) write(r0, &(0x7f0000000000)="65eeed874f8fadae", 0x8) write(r0, &(0x7f0000000400)="7afcd521dc9e0dce", 0x8) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) 15:05:16 executing program 6: r0 = eventfd(0x0) write(r0, &(0x7f0000000000)="65eeed874f8fadae", 0x8) write(r0, &(0x7f0000000400)="7afcd521dc9e0dce", 0x8) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) 15:05:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f00000004c0)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)=0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000500)={{0x107, 0x1, 0x78, 0x2e, 0xda, 0xfffffffd, 0x21f, 0x9}, "f8cee6ff2323", ['\x00', '\x00', '\x00', '\x00']}, 0x426) r1 = clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x6, 0x1, 0x70, 0x7, 0x0, 0x7, 0x14400, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_config_ext={0x3, 0xfff}, 0x0, 0x80000000, 0xffff0cea, 0x1, 0x5, 0x2, 0x1ff, 0x0, 0x3ff, 0x0, 0x1}, r1, 0xfffffffdffffffff, 0xffffffffffffffff, 0x2) r2 = inotify_init() fcntl$setstatus(r2, 0x4, 0x2800) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r2, 0x80489439, &(0x7f0000000180)) 15:05:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, VM DIAGNOSIS: 15:05:10 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000000 RCX=ffffffff812a3828 RDX=dffffc0000000000 RSI=0000000000000008 RDI=ffffffff85b01f10 RBP=1ffff11008277f41 RSP=ffff8880413bf9e8 R8 =0000000000000000 R9 =ffffffff85b01f17 R10=fffffbfff0b603e2 R11=0000000000000001 R12=0000000000000001 R13=ffffffff816e94f3 R14=ffff88801bed0000 R15=ffff888008478280 RIP=ffffffff8130ca9d RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000020001180 CR3=000000000e2a8000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000065 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b1e41 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff88804146f698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000065 R11=0000000000000001 R12=0000000000000065 R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b1e30 RIP=ffffffff822b1e99 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f2ac7a74700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f37710aa3a4 CR3=000000001d9b6000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f2aca5e57c0 00007f2aca5e57c8 YMM02=0000000000000000 0000000000000000 00007f2aca5e57e0 00007f2aca5e57c0 YMM03=0000000000000000 0000000000000000 00007f2aca5e57c8 00007f2aca5e57c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000