Warning: Permanently added '[localhost]:31580' (ECDSA) to the list of known hosts. 2022/09/19 15:08:01 fuzzer started 2022/09/19 15:08:01 dialing manager at localhost:42121 syzkaller login: [ 41.180855] cgroup: Unknown subsys name 'net' [ 41.292157] cgroup: Unknown subsys name 'rlimit' 2022/09/19 15:08:14 syscalls: 2215 2022/09/19 15:08:14 code coverage: enabled 2022/09/19 15:08:14 comparison tracing: enabled 2022/09/19 15:08:14 extra coverage: enabled 2022/09/19 15:08:14 setuid sandbox: enabled 2022/09/19 15:08:14 namespace sandbox: enabled 2022/09/19 15:08:14 Android sandbox: enabled 2022/09/19 15:08:14 fault injection: enabled 2022/09/19 15:08:14 leak checking: enabled 2022/09/19 15:08:14 net packet injection: enabled 2022/09/19 15:08:14 net device setup: enabled 2022/09/19 15:08:14 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/19 15:08:14 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/19 15:08:14 USB emulation: enabled 2022/09/19 15:08:14 hci packet injection: enabled 2022/09/19 15:08:14 wifi device emulation: failed to parse kernel version (6.0.0-rc6-next-20220919) 2022/09/19 15:08:14 802.15.4 emulation: enabled 2022/09/19 15:08:14 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/19 15:08:14 fetching corpus: 50, signal 35130/38513 (executing program) 2022/09/19 15:08:14 fetching corpus: 100, signal 47234/51995 (executing program) 2022/09/19 15:08:14 fetching corpus: 150, signal 56399/62442 (executing program) 2022/09/19 15:08:15 fetching corpus: 200, signal 62879/70183 (executing program) 2022/09/19 15:08:15 fetching corpus: 250, signal 69126/77576 (executing program) 2022/09/19 15:08:15 fetching corpus: 300, signal 75213/84693 (executing program) 2022/09/19 15:08:15 fetching corpus: 350, signal 79064/89645 (executing program) 2022/09/19 15:08:15 fetching corpus: 400, signal 85070/96510 (executing program) 2022/09/19 15:08:15 fetching corpus: 450, signal 87831/100375 (executing program) 2022/09/19 15:08:15 fetching corpus: 500, signal 91933/105354 (executing program) 2022/09/19 15:08:15 fetching corpus: 550, signal 96832/110961 (executing program) 2022/09/19 15:08:16 fetching corpus: 600, signal 100011/115000 (executing program) 2022/09/19 15:08:16 fetching corpus: 650, signal 104036/119727 (executing program) 2022/09/19 15:08:16 fetching corpus: 700, signal 107272/123658 (executing program) 2022/09/19 15:08:16 fetching corpus: 750, signal 110305/127399 (executing program) 2022/09/19 15:08:16 fetching corpus: 800, signal 113494/131182 (executing program) 2022/09/19 15:08:16 fetching corpus: 850, signal 115330/133832 (executing program) 2022/09/19 15:08:16 fetching corpus: 900, signal 119449/138407 (executing program) 2022/09/19 15:08:17 fetching corpus: 950, signal 123901/143160 (executing program) 2022/09/19 15:08:17 fetching corpus: 1000, signal 125576/145490 (executing program) 2022/09/19 15:08:17 fetching corpus: 1050, signal 127492/147955 (executing program) 2022/09/19 15:08:17 fetching corpus: 1100, signal 129886/150858 (executing program) 2022/09/19 15:08:17 fetching corpus: 1150, signal 131740/153234 (executing program) 2022/09/19 15:08:17 fetching corpus: 1200, signal 133194/155237 (executing program) 2022/09/19 15:08:17 fetching corpus: 1250, signal 134535/157216 (executing program) 2022/09/19 15:08:18 fetching corpus: 1300, signal 136725/159767 (executing program) 2022/09/19 15:08:18 fetching corpus: 1350, signal 139338/162606 (executing program) 2022/09/19 15:08:18 fetching corpus: 1400, signal 140846/164588 (executing program) 2022/09/19 15:08:18 fetching corpus: 1450, signal 142679/166774 (executing program) 2022/09/19 15:08:18 fetching corpus: 1500, signal 143979/168534 (executing program) 2022/09/19 15:08:18 fetching corpus: 1550, signal 145593/170461 (executing program) 2022/09/19 15:08:18 fetching corpus: 1600, signal 147040/172254 (executing program) 2022/09/19 15:08:18 fetching corpus: 1650, signal 148543/174091 (executing program) 2022/09/19 15:08:19 fetching corpus: 1700, signal 150603/176289 (executing program) 2022/09/19 15:08:19 fetching corpus: 1750, signal 151497/177676 (executing program) 2022/09/19 15:08:19 fetching corpus: 1800, signal 153644/179876 (executing program) 2022/09/19 15:08:19 fetching corpus: 1850, signal 155307/181739 (executing program) 2022/09/19 15:08:19 fetching corpus: 1900, signal 156587/183270 (executing program) 2022/09/19 15:08:19 fetching corpus: 1950, signal 157754/184734 (executing program) 2022/09/19 15:08:19 fetching corpus: 2000, signal 159654/186604 (executing program) 2022/09/19 15:08:20 fetching corpus: 2050, signal 161060/188189 (executing program) 2022/09/19 15:08:20 fetching corpus: 2100, signal 162005/189378 (executing program) 2022/09/19 15:08:20 fetching corpus: 2150, signal 163021/190685 (executing program) 2022/09/19 15:08:20 fetching corpus: 2200, signal 164629/192295 (executing program) 2022/09/19 15:08:20 fetching corpus: 2250, signal 165661/193574 (executing program) 2022/09/19 15:08:20 fetching corpus: 2300, signal 166756/194908 (executing program) 2022/09/19 15:08:20 fetching corpus: 2350, signal 167570/196006 (executing program) 2022/09/19 15:08:20 fetching corpus: 2400, signal 168776/197293 (executing program) 2022/09/19 15:08:21 fetching corpus: 2450, signal 170114/198650 (executing program) 2022/09/19 15:08:21 fetching corpus: 2500, signal 170902/199642 (executing program) 2022/09/19 15:08:21 fetching corpus: 2550, signal 171765/200751 (executing program) 2022/09/19 15:08:21 fetching corpus: 2600, signal 173066/202049 (executing program) 2022/09/19 15:08:21 fetching corpus: 2650, signal 174082/203157 (executing program) 2022/09/19 15:08:21 fetching corpus: 2700, signal 175100/204200 (executing program) 2022/09/19 15:08:21 fetching corpus: 2750, signal 176168/205246 (executing program) 2022/09/19 15:08:21 fetching corpus: 2800, signal 178063/206750 (executing program) 2022/09/19 15:08:22 fetching corpus: 2850, signal 179521/208018 (executing program) 2022/09/19 15:08:22 fetching corpus: 2900, signal 181988/209696 (executing program) 2022/09/19 15:08:22 fetching corpus: 2950, signal 182827/210566 (executing program) 2022/09/19 15:08:22 fetching corpus: 3000, signal 184281/211718 (executing program) 2022/09/19 15:08:22 fetching corpus: 3050, signal 185264/212596 (executing program) 2022/09/19 15:08:22 fetching corpus: 3100, signal 187599/214135 (executing program) 2022/09/19 15:08:23 fetching corpus: 3150, signal 188355/214877 (executing program) 2022/09/19 15:08:23 fetching corpus: 3200, signal 189442/215748 (executing program) 2022/09/19 15:08:23 fetching corpus: 3250, signal 190267/216582 (executing program) 2022/09/19 15:08:23 fetching corpus: 3300, signal 190972/217292 (executing program) 2022/09/19 15:08:23 fetching corpus: 3350, signal 192353/218287 (executing program) 2022/09/19 15:08:23 fetching corpus: 3400, signal 193153/218983 (executing program) 2022/09/19 15:08:23 fetching corpus: 3450, signal 193893/219669 (executing program) 2022/09/19 15:08:23 fetching corpus: 3500, signal 194725/220365 (executing program) 2022/09/19 15:08:24 fetching corpus: 3550, signal 195389/221001 (executing program) 2022/09/19 15:08:24 fetching corpus: 3600, signal 196560/221808 (executing program) 2022/09/19 15:08:24 fetching corpus: 3650, signal 197408/222446 (executing program) 2022/09/19 15:08:24 fetching corpus: 3700, signal 198376/223117 (executing program) 2022/09/19 15:08:24 fetching corpus: 3750, signal 199041/223701 (executing program) 2022/09/19 15:08:24 fetching corpus: 3800, signal 200080/224411 (executing program) 2022/09/19 15:08:24 fetching corpus: 3850, signal 200881/225005 (executing program) 2022/09/19 15:08:25 fetching corpus: 3900, signal 201756/225586 (executing program) 2022/09/19 15:08:25 fetching corpus: 3950, signal 202410/226090 (executing program) 2022/09/19 15:08:25 fetching corpus: 4000, signal 203765/226850 (executing program) 2022/09/19 15:08:25 fetching corpus: 4050, signal 204291/227284 (executing program) 2022/09/19 15:08:25 fetching corpus: 4100, signal 204604/227651 (executing program) 2022/09/19 15:08:25 fetching corpus: 4150, signal 205278/228137 (executing program) 2022/09/19 15:08:25 fetching corpus: 4200, signal 205844/228560 (executing program) 2022/09/19 15:08:25 fetching corpus: 4250, signal 206759/229064 (executing program) 2022/09/19 15:08:26 fetching corpus: 4300, signal 207964/229619 (executing program) 2022/09/19 15:08:26 fetching corpus: 4350, signal 208559/230031 (executing program) 2022/09/19 15:08:26 fetching corpus: 4400, signal 209386/230459 (executing program) 2022/09/19 15:08:26 fetching corpus: 4450, signal 210124/230943 (executing program) 2022/09/19 15:08:26 fetching corpus: 4500, signal 210807/231322 (executing program) 2022/09/19 15:08:26 fetching corpus: 4550, signal 211571/231728 (executing program) 2022/09/19 15:08:26 fetching corpus: 4600, signal 212244/232083 (executing program) 2022/09/19 15:08:26 fetching corpus: 4650, signal 213022/232496 (executing program) 2022/09/19 15:08:27 fetching corpus: 4700, signal 213965/232891 (executing program) 2022/09/19 15:08:27 fetching corpus: 4750, signal 214679/233247 (executing program) 2022/09/19 15:08:27 fetching corpus: 4800, signal 215797/233639 (executing program) 2022/09/19 15:08:27 fetching corpus: 4850, signal 216592/233959 (executing program) 2022/09/19 15:08:27 fetching corpus: 4900, signal 217487/234279 (executing program) 2022/09/19 15:08:27 fetching corpus: 4950, signal 218373/234584 (executing program) 2022/09/19 15:08:27 fetching corpus: 5000, signal 218886/234807 (executing program) 2022/09/19 15:08:28 fetching corpus: 5050, signal 219739/235069 (executing program) 2022/09/19 15:08:28 fetching corpus: 5100, signal 220338/235272 (executing program) 2022/09/19 15:08:28 fetching corpus: 5150, signal 221196/235514 (executing program) 2022/09/19 15:08:28 fetching corpus: 5200, signal 221990/235782 (executing program) 2022/09/19 15:08:28 fetching corpus: 5250, signal 222409/235974 (executing program) 2022/09/19 15:08:28 fetching corpus: 5297, signal 223034/236157 (executing program) 2022/09/19 15:08:28 fetching corpus: 5345, signal 223742/236342 (executing program) 2022/09/19 15:08:28 fetching corpus: 5394, signal 224200/236506 (executing program) 2022/09/19 15:08:29 fetching corpus: 5442, signal 225390/236774 (executing program) 2022/09/19 15:08:29 fetching corpus: 5492, signal 225701/236888 (executing program) 2022/09/19 15:08:29 fetching corpus: 5541, signal 226061/237016 (executing program) 2022/09/19 15:08:29 fetching corpus: 5590, signal 226719/237143 (executing program) 2022/09/19 15:08:29 fetching corpus: 5639, signal 227159/237256 (executing program) 2022/09/19 15:08:29 fetching corpus: 5689, signal 227577/237433 (executing program) 2022/09/19 15:08:29 fetching corpus: 5738, signal 228070/237536 (executing program) 2022/09/19 15:08:29 fetching corpus: 5787, signal 228450/237571 (executing program) 2022/09/19 15:08:29 fetching corpus: 5837, signal 228794/237597 (executing program) 2022/09/19 15:08:30 fetching corpus: 5887, signal 229610/237611 (executing program) 2022/09/19 15:08:30 fetching corpus: 5937, signal 230105/237622 (executing program) 2022/09/19 15:08:30 fetching corpus: 5973, signal 230645/237644 (executing program) 2022/09/19 15:08:30 fetching corpus: 5973, signal 230645/237644 (executing program) 2022/09/19 15:08:32 starting 8 fuzzer processes 15:08:32 executing program 0: msync(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7) 15:08:32 executing program 1: signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 15:08:32 executing program 3: syz_mount_image$msdos(&(0x7f0000001dc0), &(0x7f0000001e00)='./file0\x00', 0x0, 0x2, &(0x7f0000002180)=[{&(0x7f0000001f00)="b5", 0x1, 0xffffffffffff8612}, {&(0x7f0000001f80)="b8", 0x1}], 0x8, &(0x7f0000002240)={[{@dots}, {@nodots}, {@dots}], [{@seclabel}, {@pcr}]}) 15:08:32 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @random="2722b090ea1b", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x14, 0x2f, 0x0, @local, @local, {[@hopopts={0x32}], {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x0) 15:08:32 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000580)={{0x0, 0x100000001, 0x0, 0x2, 0x1, 0x2, 0x0, 0x3, 0x7c0000, 0x3, 0x4, 0xb65d, 0x8, 0x0, 0x6}}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="02b2dccad213e1e6cf54b7a797f8f22a47f25b7658fb110b2e76f95b0f318b8fa745e6ffba4414d29a42bfab524bc5bffb17decc4540a6f00b9772f5f9789a9525790df8d989b23530d0a1398f2ad734c7ff47961be476ffeec81efa3d3aa64b8ea329261dfc2e1047a68670f0e5950d6a5414956bddd09e101b5b66e5742fe843413e065e3b86a242b37bc58c68153a45015f6f1ea67762c302e461e0c84bbb7f8d464f5a72d9fad56dac0c5028a4012a93dbc7da640786e3c9898cdd8fe091b166bfcd66e6257abc923ceaf90e994deded3fe8a59c2105f5caf366d32170ef51299dbf441bc3cddda352a2e07375fb44e75fed8082f3e960015d9bcddb0c834feda68d113a9a9fc0d1c30153685caf43b176219b666d74e67b6192cfd8a561c6c4aadcc80ed8c469bc41b028f1db515d699e45ad3379f9b1edb8de4bb2f8615d6716297baac7e45073fcecf31e51ec78c40edd78f245bced04414f849fb961fbbe79ff2ed7c48ec1b5331f9755d7094986fc8da198ce4a12f9ddfb43e565bc4fed618da9a693d03c3e7ec4b3014dfc022103e277c1b12efb03ef8b197f3a931f6cbe238cf8a4e7639b409b4586f66da41b94eed69d52ba9fde5aa1ee774d4e626932dc3511b10ae3bc3e8688a7a83b0467dfbf92951747396735c9f47ad4552e7bdf4f8e7998a1266a360beb2ec1527390452139f9ab91ee250efcf3413e72a6b2688d8b6a4748ccc165bbf886573ccdd03bd93f32a866cd878ec246e06f31d4d7f7ec9836b7305ee0c1b9fa75cd6e4ca5cc2f107b654f15a2442cd9c8eaf581d093639fe35e0da49394c5ed66ad29bc2b863649e16c1951d0d3dd6f1048539e558ee1f059d91510a5acd84777ca01545635d2fb40e2f205bb11435023e47e4e2f85b6d1b56b688dd1a4304708a561d32dbaa6cd4f969e67af33773d4e9772751019dc6c2af7e2fe9d3c7eb6f1b401926603d90802f792b081957dd5ebd18410cd42b2ea05ae9a61254e4b878384b8a376fe9eba06afc1253f2224fab88feb7c426e3dfb19385afbb42cc13209b419568eeafdf505dc5ca30acc17d337e941e0badf9f9413f381fe9a315e2597426805827943f193f02a12554d434bd91708a28d9da1bf64ad64f80a7287d1e02d5d1f14bf9d89ba3badfa524694db6a651e97", 0x341}], 0x1) [ 72.178290] audit: type=1400 audit(1663600112.828:6): avc: denied { execmem } for pid=285 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 15:08:32 executing program 5: io_setup(0x3ff, &(0x7f0000000140)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') io_submit(r0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x200000}]) io_pgetevents(r0, 0x0, 0x2, &(0x7f0000000340)=[{}, {}], 0x0, 0x0) 15:08:32 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000340)={'wpan4\x00'}) 15:08:32 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)={0x28, r1, 0x301, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) [ 73.420301] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 73.423285] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 73.424690] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 73.428151] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 73.430036] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 73.431400] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 73.436896] Bluetooth: hci0: HCI_REQ-0x0c1a [ 73.470986] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 73.479879] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 73.484674] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 73.486372] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 73.491892] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 73.492966] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 73.494630] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 73.495915] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 73.498177] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 73.505165] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 73.514669] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 73.516273] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 73.520999] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 73.522921] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 73.523945] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 73.526060] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 73.527303] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 73.529086] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 73.535706] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 73.538693] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 73.540202] Bluetooth: hci4: HCI_REQ-0x0c1a [ 73.542811] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 73.544213] Bluetooth: hci1: HCI_REQ-0x0c1a [ 73.544701] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 73.546267] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 73.560724] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 73.562490] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 73.570050] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 73.574915] Bluetooth: hci6: HCI_REQ-0x0c1a [ 73.581049] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 73.581292] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 73.584174] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 73.584204] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 73.587016] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 73.588902] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 73.591380] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 73.593011] Bluetooth: hci3: HCI_REQ-0x0c1a [ 73.593591] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 73.603650] Bluetooth: hci5: HCI_REQ-0x0c1a [ 73.630647] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 73.646093] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 73.659462] Bluetooth: hci2: HCI_REQ-0x0c1a [ 73.701512] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 73.706711] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 73.717262] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 73.733538] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 73.744986] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 73.752047] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 73.763027] Bluetooth: hci7: HCI_REQ-0x0c1a [ 75.493486] Bluetooth: hci0: command 0x0409 tx timeout [ 75.556855] Bluetooth: hci1: command 0x0409 tx timeout [ 75.557327] Bluetooth: hci4: command 0x0409 tx timeout [ 75.620810] Bluetooth: hci5: command 0x0409 tx timeout [ 75.621376] Bluetooth: hci3: command 0x0409 tx timeout [ 75.621854] Bluetooth: hci6: command 0x0409 tx timeout [ 75.684833] Bluetooth: hci2: command 0x0409 tx timeout [ 75.812850] Bluetooth: hci7: command 0x0409 tx timeout [ 77.540858] Bluetooth: hci0: command 0x041b tx timeout [ 77.604826] Bluetooth: hci4: command 0x041b tx timeout [ 77.605242] Bluetooth: hci1: command 0x041b tx timeout [ 77.668798] Bluetooth: hci3: command 0x041b tx timeout [ 77.668818] Bluetooth: hci6: command 0x041b tx timeout [ 77.669683] Bluetooth: hci5: command 0x041b tx timeout [ 77.733842] Bluetooth: hci2: command 0x041b tx timeout [ 77.861917] Bluetooth: hci7: command 0x041b tx timeout [ 79.589799] Bluetooth: hci0: command 0x040f tx timeout [ 79.653977] Bluetooth: hci1: command 0x040f tx timeout [ 79.654479] Bluetooth: hci4: command 0x040f tx timeout [ 79.717810] Bluetooth: hci5: command 0x040f tx timeout [ 79.718297] Bluetooth: hci6: command 0x040f tx timeout [ 79.718715] Bluetooth: hci3: command 0x040f tx timeout [ 79.781803] Bluetooth: hci2: command 0x040f tx timeout [ 79.908808] Bluetooth: hci7: command 0x040f tx timeout [ 81.637884] Bluetooth: hci0: command 0x0419 tx timeout [ 81.701865] Bluetooth: hci4: command 0x0419 tx timeout [ 81.702321] Bluetooth: hci1: command 0x0419 tx timeout [ 81.764823] Bluetooth: hci3: command 0x0419 tx timeout [ 81.765257] Bluetooth: hci6: command 0x0419 tx timeout [ 81.765644] Bluetooth: hci5: command 0x0419 tx timeout [ 81.829833] Bluetooth: hci2: command 0x0419 tx timeout [ 81.957802] Bluetooth: hci7: command 0x0419 tx timeout [ 124.758925] loop3: detected capacity change from 0 to 16262 [ 124.762532] FAT-fs (loop3): Unrecognized mount option "pcr=00000000000000000000" or missing value [ 124.778265] loop3: detected capacity change from 0 to 16262 [ 124.782164] FAT-fs (loop3): Unrecognized mount option "pcr=00000000000000000000" or missing value 15:09:25 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000000)={{0x0, 0x4}, 'port0\x00'}) 15:09:25 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000000)={{0x0, 0x4}, 'port0\x00'}) 15:09:25 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000000)={{0x0, 0x4}, 'port0\x00'}) 15:09:25 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000000)={{0x0, 0x4}, 'port0\x00'}) 15:09:25 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000940)='./file0\x00', &(0x7f00000009c0)=[&(0x7f0000000980)='\x00'], 0x0, 0x1000) 15:09:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)={0x18, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x18}], 0x1}, 0x0) 15:09:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)={0x18, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x18}], 0x1}, 0x0) 15:09:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)={0x18, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x18}], 0x1}, 0x0) [ 128.096954] audit: type=1400 audit(1663600168.746:7): avc: denied { open } for pid=3943 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 128.098517] audit: type=1400 audit(1663600168.747:8): avc: denied { kernel } for pid=3943 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 128.101884] ------------[ cut here ]------------ [ 128.101908] [ 128.101911] ====================================================== [ 128.101915] WARNING: possible circular locking dependency detected [ 128.101920] 6.0.0-rc6-next-20220919 #1 Not tainted [ 128.101926] ------------------------------------------------------ [ 128.101930] syz-executor.4/3944 is trying to acquire lock: [ 128.101936] ffffffff853fa838 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 128.101976] [ 128.101976] but task is already holding lock: [ 128.101979] ffff88800e34ac20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 128.102008] [ 128.102008] which lock already depends on the new lock. [ 128.102008] [ 128.102012] [ 128.102012] the existing dependency chain (in reverse order) is: [ 128.102015] [ 128.102015] -> #3 (&ctx->lock){....}-{2:2}: [ 128.102029] _raw_spin_lock+0x2a/0x40 [ 128.102046] __perf_event_task_sched_out+0x53b/0x18d0 [ 128.102059] __schedule+0xedd/0x2470 [ 128.102069] schedule+0xda/0x1b0 [ 128.102079] exit_to_user_mode_prepare+0x114/0x1a0 [ 128.102100] syscall_exit_to_user_mode+0x19/0x40 [ 128.102118] do_syscall_64+0x48/0x90 [ 128.102133] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 128.102151] [ 128.102151] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 128.102166] _raw_spin_lock_nested+0x30/0x40 [ 128.102182] raw_spin_rq_lock_nested+0x1e/0x30 [ 128.102195] task_fork_fair+0x63/0x4d0 [ 128.102212] sched_cgroup_fork+0x3d0/0x540 [ 128.102227] copy_process+0x4183/0x6e20 [ 128.102238] kernel_clone+0xe7/0x890 [ 128.102249] user_mode_thread+0xad/0xf0 [ 128.102260] rest_init+0x24/0x250 [ 128.102277] arch_call_rest_init+0xf/0x14 [ 128.102291] start_kernel+0x4c1/0x4e6 [ 128.102303] secondary_startup_64_no_verify+0xe0/0xeb [ 128.102321] [ 128.102321] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 128.102336] _raw_spin_lock_irqsave+0x39/0x60 [ 128.102351] try_to_wake_up+0xab/0x1920 [ 128.102365] up+0x75/0xb0 [ 128.102376] __up_console_sem+0x6e/0x80 [ 128.102393] console_unlock+0x46a/0x590 [ 128.102409] vprintk_emit+0x1bd/0x560 [ 128.102426] vprintk+0x84/0xa0 [ 128.102443] _printk+0xba/0xf1 [ 128.102461] kauditd_hold_skb.cold+0x3f/0x4e [ 128.102475] kauditd_send_queue+0x233/0x290 [ 128.102492] kauditd_thread+0x5da/0x9a0 [ 128.102506] kthread+0x2ed/0x3a0 [ 128.102521] ret_from_fork+0x22/0x30 [ 128.102534] [ 128.102534] -> #0 ((console_sem).lock){....}-{2:2}: [ 128.102550] __lock_acquire+0x2a02/0x5e70 [ 128.102566] lock_acquire+0x1a2/0x530 [ 128.102582] _raw_spin_lock_irqsave+0x39/0x60 [ 128.102598] down_trylock+0xe/0x70 [ 128.102611] __down_trylock_console_sem+0x3b/0xd0 [ 128.102627] vprintk_emit+0x16b/0x560 [ 128.102644] vprintk+0x84/0xa0 [ 128.102660] _printk+0xba/0xf1 [ 128.102677] report_bug.cold+0x72/0xab [ 128.102691] handle_bug+0x3c/0x70 [ 128.102704] exc_invalid_op+0x14/0x50 [ 128.102718] asm_exc_invalid_op+0x16/0x20 [ 128.102734] group_sched_out.part.0+0x2c7/0x460 [ 128.102745] ctx_sched_out+0x8f1/0xc10 [ 128.102755] __perf_event_task_sched_out+0x6d0/0x18d0 [ 128.102768] __schedule+0xedd/0x2470 [ 128.102779] schedule+0xda/0x1b0 [ 128.102789] exit_to_user_mode_prepare+0x114/0x1a0 [ 128.102808] syscall_exit_to_user_mode+0x19/0x40 [ 128.102826] do_syscall_64+0x48/0x90 [ 128.102839] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 128.102857] [ 128.102857] other info that might help us debug this: [ 128.102857] [ 128.102860] Chain exists of: [ 128.102860] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 128.102860] [ 128.102876] Possible unsafe locking scenario: [ 128.102876] [ 128.102878] CPU0 CPU1 [ 128.102881] ---- ---- [ 128.102884] lock(&ctx->lock); [ 128.102892] lock(&rq->__lock); [ 128.102899] lock(&ctx->lock); [ 128.102907] lock((console_sem).lock); [ 128.102915] [ 128.102915] *** DEADLOCK *** [ 128.102915] [ 128.102917] 2 locks held by syz-executor.4/3944: [ 128.102924] #0: ffff88806ce37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 128.102951] #1: ffff88800e34ac20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 128.102981] [ 128.102981] stack backtrace: [ 128.102984] CPU: 0 PID: 3944 Comm: syz-executor.4 Not tainted 6.0.0-rc6-next-20220919 #1 [ 128.102997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 128.103005] Call Trace: [ 128.103009] [ 128.103013] dump_stack_lvl+0x8b/0xb3 [ 128.103028] check_noncircular+0x263/0x2e0 [ 128.103044] ? format_decode+0x26c/0xb50 [ 128.103059] ? print_circular_bug+0x450/0x450 [ 128.103076] ? enable_ptr_key_workfn+0x20/0x20 [ 128.103089] ? __lockdep_reset_lock+0x180/0x180 [ 128.103106] ? format_decode+0x26c/0xb50 [ 128.103121] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 128.103138] __lock_acquire+0x2a02/0x5e70 [ 128.103159] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 128.103181] lock_acquire+0x1a2/0x530 [ 128.103198] ? down_trylock+0xe/0x70 [ 128.103212] ? lock_release+0x750/0x750 [ 128.103230] ? find_held_lock+0x2c/0x110 [ 128.103246] ? vprintk+0x84/0xa0 [ 128.103264] _raw_spin_lock_irqsave+0x39/0x60 [ 128.103279] ? down_trylock+0xe/0x70 [ 128.103292] down_trylock+0xe/0x70 [ 128.103305] ? vprintk+0x84/0xa0 [ 128.103321] __down_trylock_console_sem+0x3b/0xd0 [ 128.103338] vprintk_emit+0x16b/0x560 [ 128.103357] vprintk+0x84/0xa0 [ 128.103374] _printk+0xba/0xf1 [ 128.103391] ? record_print_text.cold+0x16/0x16 [ 128.103410] ? hrtimer_try_to_cancel+0x163/0x2c0 [ 128.103424] ? lock_downgrade+0x6d0/0x6d0 [ 128.103441] ? report_bug.cold+0x66/0xab [ 128.103456] ? group_sched_out.part.0+0x2c7/0x460 [ 128.103467] report_bug.cold+0x72/0xab [ 128.103482] handle_bug+0x3c/0x70 [ 128.103495] exc_invalid_op+0x14/0x50 [ 128.103510] asm_exc_invalid_op+0x16/0x20 [ 128.103527] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 128.103540] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d 5b 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 128.103551] RSP: 0018:ffff88800fdafc48 EFLAGS: 00010006 [ 128.103560] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 128.103568] RDX: ffff8880175d8000 RSI: ffffffff81566077 RDI: 0000000000000005 [ 128.103576] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 128.103584] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800e34ac00 [ 128.103591] R13: ffff88806ce3d140 R14: ffffffff8547bf80 R15: 0000000000000002 [ 128.103602] ? group_sched_out.part.0+0x2c7/0x460 [ 128.103615] ? group_sched_out.part.0+0x2c7/0x460 [ 128.103628] ctx_sched_out+0x8f1/0xc10 [ 128.103641] __perf_event_task_sched_out+0x6d0/0x18d0 [ 128.103656] ? lock_is_held_type+0xd7/0x130 [ 128.103674] ? __perf_cgroup_move+0x160/0x160 [ 128.103686] ? set_next_entity+0x304/0x550 [ 128.103703] ? update_curr+0x267/0x740 [ 128.103721] ? lock_is_held_type+0xd7/0x130 [ 128.103739] __schedule+0xedd/0x2470 [ 128.103752] ? io_schedule_timeout+0x150/0x150 [ 128.103765] ? __x64_sys_futex_time32+0x480/0x480 [ 128.103779] schedule+0xda/0x1b0 [ 128.103790] exit_to_user_mode_prepare+0x114/0x1a0 [ 128.103810] syscall_exit_to_user_mode+0x19/0x40 [ 128.103828] do_syscall_64+0x48/0x90 [ 128.103842] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 128.103859] RIP: 0033:0x7f140256ab19 [ 128.103868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.103879] RSP: 002b:00007f13ffae0218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 128.103890] RAX: 0000000000000001 RBX: 00007f140267df68 RCX: 00007f140256ab19 [ 128.103898] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f140267df6c [ 128.103905] RBP: 00007f140267df60 R08: 000000000000000e R09: 0000000000000000 [ 128.103913] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f140267df6c [ 128.103920] R13: 00007ffe3949d23f R14: 00007f13ffae0300 R15: 0000000000022000 [ 128.103933] [ 128.158459] WARNING: CPU: 0 PID: 3944 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 128.159105] Modules linked in: [ 128.159333] CPU: 0 PID: 3944 Comm: syz-executor.4 Not tainted 6.0.0-rc6-next-20220919 #1 [ 128.159896] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 128.160683] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 128.161064] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d 5b 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 128.162314] RSP: 0018:ffff88800fdafc48 EFLAGS: 00010006 [ 128.162686] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 128.163183] RDX: ffff8880175d8000 RSI: ffffffff81566077 RDI: 0000000000000005 [ 128.163682] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 128.164177] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800e34ac00 [ 128.164686] R13: ffff88806ce3d140 R14: ffffffff8547bf80 R15: 0000000000000002 [ 128.165208] FS: 00007f13ffae0700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 128.165785] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 128.166209] CR2: 0000000020000280 CR3: 0000000020452000 CR4: 0000000000350ef0 [ 128.166726] Call Trace: [ 128.166919] [ 128.167087] ctx_sched_out+0x8f1/0xc10 [ 128.167381] __perf_event_task_sched_out+0x6d0/0x18d0 [ 128.167768] ? lock_is_held_type+0xd7/0x130 [ 128.168099] ? __perf_cgroup_move+0x160/0x160 [ 128.168434] ? set_next_entity+0x304/0x550 [ 128.168752] ? update_curr+0x267/0x740 [ 128.169047] ? lock_is_held_type+0xd7/0x130 [ 128.169376] __schedule+0xedd/0x2470 [ 128.169665] ? io_schedule_timeout+0x150/0x150 [ 128.170009] ? __x64_sys_futex_time32+0x480/0x480 [ 128.170371] schedule+0xda/0x1b0 [ 128.170635] exit_to_user_mode_prepare+0x114/0x1a0 [ 128.171008] syscall_exit_to_user_mode+0x19/0x40 [ 128.171368] do_syscall_64+0x48/0x90 [ 128.171650] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 128.172037] RIP: 0033:0x7f140256ab19 [ 128.172313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.173651] RSP: 002b:00007f13ffae0218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 128.174213] RAX: 0000000000000001 RBX: 00007f140267df68 RCX: 00007f140256ab19 [ 128.174736] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f140267df6c [ 128.175270] RBP: 00007f140267df60 R08: 000000000000000e R09: 0000000000000000 [ 128.175794] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f140267df6c [ 128.176311] R13: 00007ffe3949d23f R14: 00007f13ffae0300 R15: 0000000000022000 [ 128.176839] [ 128.177015] irq event stamp: 522 [ 128.177264] hardirqs last enabled at (521): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 128.177943] hardirqs last disabled at (522): [] __schedule+0x1225/0x2470 [ 128.178543] softirqs last enabled at (158): [] __irq_exit_rcu+0x11b/0x180 [ 128.179179] softirqs last disabled at (143): [] __irq_exit_rcu+0x11b/0x180 [ 128.179808] ---[ end trace 0000000000000000 ]--- [ 128.232489] audit: type=1400 audit(1663600168.882:9): avc: denied { write } for pid=3943 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 15:09:29 executing program 0: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000580)={{0x0, 0x100000001, 0x0, 0x2, 0x1, 0x2, 0x0, 0x3, 0x7c0000, 0x3, 0x4, 0xb65d, 0x8, 0x0, 0x6}}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x341}], 0x1) 15:09:29 executing program 6: io_setup(0x3ff, &(0x7f0000000140)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') io_submit(r0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x200000}]) io_pgetevents(r0, 0x0, 0x2, &(0x7f0000000340)=[{}, {}], 0x0, 0x0) 15:09:29 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)={0x28, r1, 0x301, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) 15:09:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)={0x18, 0x6d, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, 0x18}], 0x1}, 0x0) 15:09:29 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @random="2722b090ea1b", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x14, 0x2f, 0x0, @local, @local, {[@hopopts={0x32}], {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x0) 15:09:29 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000580)={{0x0, 0x100000001, 0x0, 0x2, 0x1, 0x2, 0x0, 0x3, 0x7c0000, 0x3, 0x4, 0xb65d, 0x8, 0x0, 0x6}}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x341}], 0x1) 15:09:29 executing program 5: io_setup(0x3ff, &(0x7f0000000140)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') io_submit(r0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x200000}]) io_pgetevents(r0, 0x0, 0x2, &(0x7f0000000340)=[{}, {}], 0x0, 0x0) 15:09:29 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf470, 0x6, @perf_config_ext={0x9, 0x4}, 0x40021, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1be2f630}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) process_vm_readv(r2, &(0x7f0000000a00)=[{&(0x7f0000000600)=""/252, 0xfc}, {&(0x7f0000000140)}, {&(0x7f0000000700)=""/121, 0x79}, {&(0x7f0000000840)=""/171, 0xab}, {0x0}, {&(0x7f0000000900)=""/209, 0xd1}], 0x6, &(0x7f0000000400), 0x0, 0x0) clone3(&(0x7f0000000480)={0x100008100, &(0x7f0000000040), &(0x7f0000000100), 0x0, {0x3}, &(0x7f00000003c0)=""/147, 0x93, 0x0, &(0x7f0000000300)=[0x0, 0x0, r2], 0x3}, 0x58) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) 15:09:29 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)={0x28, r1, 0x301, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) 15:09:29 executing program 5: io_setup(0x3ff, &(0x7f0000000140)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') io_submit(r0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x200000}]) io_pgetevents(r0, 0x0, 0x2, &(0x7f0000000340)=[{}, {}], 0x0, 0x0) 15:09:29 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @random="2722b090ea1b", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x14, 0x2f, 0x0, @local, @local, {[@hopopts={0x32}], {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x0) 15:09:29 executing program 6: io_setup(0x3ff, &(0x7f0000000140)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') io_submit(r0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x200000}]) io_pgetevents(r0, 0x0, 0x2, &(0x7f0000000340)=[{}, {}], 0x0, 0x0) 15:09:29 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000100)={@local, @local, @void, {@ipv4={0x800, @udp={{0xc, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x11, 0x0, @private=0xa010101, @remote, {[@timestamp_addr={0x44, 0x1c, 0xf, 0x1, 0x0, [{@local}, {@private}, {@private}]}]}}, {0x0, 0x0, 0x8}}}}}, 0x0) 15:09:29 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000580)={{0x0, 0x100000001, 0x0, 0x2, 0x1, 0x2, 0x0, 0x3, 0x7c0000, 0x3, 0x4, 0xb65d, 0x8, 0x0, 0x6}}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x341}], 0x1) 15:09:29 executing program 0: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000580)={{0x0, 0x100000001, 0x0, 0x2, 0x1, 0x2, 0x0, 0x3, 0x7c0000, 0x3, 0x4, 0xb65d, 0x8, 0x0, 0x6}}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x341}], 0x1) 15:09:29 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf470, 0x6, @perf_config_ext={0x9, 0x4}, 0x40021, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1be2f630}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) process_vm_readv(r2, &(0x7f0000000a00)=[{&(0x7f0000000600)=""/252, 0xfc}, {&(0x7f0000000140)}, {&(0x7f0000000700)=""/121, 0x79}, {&(0x7f0000000840)=""/171, 0xab}, {0x0}, {&(0x7f0000000900)=""/209, 0xd1}], 0x6, &(0x7f0000000400), 0x0, 0x0) clone3(&(0x7f0000000480)={0x100008100, &(0x7f0000000040), &(0x7f0000000100), 0x0, {0x3}, &(0x7f00000003c0)=""/147, 0x93, 0x0, &(0x7f0000000300)=[0x0, 0x0, r2], 0x3}, 0x58) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) 15:09:29 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @random="2722b090ea1b", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x14, 0x2f, 0x0, @local, @local, {[@hopopts={0x32}], {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x0) 15:09:29 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000100)={@local, @local, @void, {@ipv4={0x800, @udp={{0xc, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x11, 0x0, @private=0xa010101, @remote, {[@timestamp_addr={0x44, 0x1c, 0xf, 0x1, 0x0, [{@local}, {@private}, {@private}]}]}}, {0x0, 0x0, 0x8}}}}}, 0x0) 15:09:29 executing program 6: io_setup(0x3ff, &(0x7f0000000140)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') io_submit(r0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x200000}]) io_pgetevents(r0, 0x0, 0x2, &(0x7f0000000340)=[{}, {}], 0x0, 0x0) 15:09:29 executing program 5: io_setup(0x3ff, &(0x7f0000000140)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') io_submit(r0, 0x1, &(0x7f0000001340)=[&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x200000}]) io_pgetevents(r0, 0x0, 0x2, &(0x7f0000000340)=[{}, {}], 0x0, 0x0) 15:09:29 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)={0x28, r1, 0x301, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) 15:09:29 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000580)={{0x0, 0x100000001, 0x0, 0x2, 0x1, 0x2, 0x0, 0x3, 0x7c0000, 0x3, 0x4, 0xb65d, 0x8, 0x0, 0x6}}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x341}], 0x1) 15:09:29 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000100)={@local, @local, @void, {@ipv4={0x800, @udp={{0xc, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x11, 0x0, @private=0xa010101, @remote, {[@timestamp_addr={0x44, 0x1c, 0xf, 0x1, 0x0, [{@local}, {@private}, {@private}]}]}}, {0x0, 0x0, 0x8}}}}}, 0x0) 15:09:29 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf470, 0x6, @perf_config_ext={0x9, 0x4}, 0x40021, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1be2f630}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) process_vm_readv(r2, &(0x7f0000000a00)=[{&(0x7f0000000600)=""/252, 0xfc}, {&(0x7f0000000140)}, {&(0x7f0000000700)=""/121, 0x79}, {&(0x7f0000000840)=""/171, 0xab}, {0x0}, {&(0x7f0000000900)=""/209, 0xd1}], 0x6, &(0x7f0000000400), 0x0, 0x0) clone3(&(0x7f0000000480)={0x100008100, &(0x7f0000000040), &(0x7f0000000100), 0x0, {0x3}, &(0x7f00000003c0)=""/147, 0x93, 0x0, &(0x7f0000000300)=[0x0, 0x0, r2], 0x3}, 0x58) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) 15:09:29 executing program 2: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x48800, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x530a, 0x0) 15:09:29 executing program 0: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000580)={{0x0, 0x100000001, 0x0, 0x2, 0x1, 0x2, 0x0, 0x3, 0x7c0000, 0x3, 0x4, 0xb65d, 0x8, 0x0, 0x6}}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x341}], 0x1) 15:09:29 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000100)={@local, @local, @void, {@ipv4={0x800, @udp={{0xc, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x11, 0x0, @private=0xa010101, @remote, {[@timestamp_addr={0x44, 0x1c, 0xf, 0x1, 0x0, [{@local}, {@private}, {@private}]}]}}, {0x0, 0x0, 0x8}}}}}, 0x0) 15:09:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r1, 0x82307202, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000025c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=n']) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000006) [ 129.078687] 9p: Unknown Cache mode n [ 129.097713] audit: type=1326 audit(1663600169.747:10): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4029 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9f72844b19 code=0x0 15:09:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)) 15:09:29 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {0x4}, {0x7}, {0x3}, {0x6}]}) [ 129.132710] loop6: detected capacity change from 0 to 4096 [ 129.168923] EXT4-fs error (device loop6): ext4_quota_enable:6781: comm syz-executor.6: Bad quota inode # 4 [ 129.169732] EXT4-fs warning (device loop6): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 129.176393] EXT4-fs (loop6): mount failed [ 129.187385] loop6: detected capacity change from 0 to 4096 [ 129.198627] EXT4-fs error (device loop6): ext4_quota_enable:6781: comm syz-executor.6: Bad quota inode # 4 [ 129.199626] EXT4-fs warning (device loop6): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 129.202503] EXT4-fs (loop6): mount failed 15:09:29 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf470, 0x6, @perf_config_ext={0x9, 0x4}, 0x40021, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1be2f630}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) process_vm_readv(r2, &(0x7f0000000a00)=[{&(0x7f0000000600)=""/252, 0xfc}, {&(0x7f0000000140)}, {&(0x7f0000000700)=""/121, 0x79}, {&(0x7f0000000840)=""/171, 0xab}, {0x0}, {&(0x7f0000000900)=""/209, 0xd1}], 0x6, &(0x7f0000000400), 0x0, 0x0) clone3(&(0x7f0000000480)={0x100008100, &(0x7f0000000040), &(0x7f0000000100), 0x0, {0x3}, &(0x7f00000003c0)=""/147, 0x93, 0x0, &(0x7f0000000300)=[0x0, 0x0, r2], 0x3}, 0x58) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) 15:09:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)) 15:09:29 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf470, 0x6, @perf_config_ext={0x9, 0x4}, 0x40021, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1be2f630}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) process_vm_readv(r2, &(0x7f0000000a00)=[{&(0x7f0000000600)=""/252, 0xfc}, {&(0x7f0000000140)}, {&(0x7f0000000700)=""/121, 0x79}, {&(0x7f0000000840)=""/171, 0xab}, {0x0}, {&(0x7f0000000900)=""/209, 0xd1}], 0x6, &(0x7f0000000400), 0x0, 0x0) clone3(&(0x7f0000000480)={0x100008100, &(0x7f0000000040), &(0x7f0000000100), 0x0, {0x3}, &(0x7f00000003c0)=""/147, 0x93, 0x0, &(0x7f0000000300)=[0x0, 0x0, r2], 0x3}, 0x58) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) 15:09:29 executing program 3: msync(&(0x7f0000fef000/0x2000)=nil, 0x2000, 0x6) [ 129.238708] loop6: detected capacity change from 0 to 4096 15:09:29 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000340)={0x2, 0x4, 0x1, 0x8000, 0x5, [{0x7fff, 0xffff, 0x7f, '\x00', 0x800}, {0x1, 0xee16, 0x86, '\x00', 0x48a}, {0x8, 0x9, 0x9, '\x00', 0x3000}, {0x3, 0x10000, 0x7, '\x00', 0x3080}, {0x9, 0x8, 0x10000, '\x00', 0x3105}]}) sendmsg$nl_xfrm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6, 0x4, {0x83}}]}, 0x1c}}, 0x0) io_submit(0x0, 0x2, &(0x7f0000000480)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x8, 0xffffffffffffffff, &(0x7f0000000000)="aee60b9d3a16bf3a0d8f84f70adfb0d08dabbd09704165008be1315c6ce97074b640dda589f635ce9b68e9fb11261eb08eebe7583173caf4f348a65a57f974619ac98150491b3f637856cc6ba82696ed7f5e64b960518203f82de637e0a3d943372f48f716ae5f47a0d23a", 0x6b, 0x0, 0x0, 0x2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x3, r0, &(0x7f0000000240)="35883ddb17a16d0a79de2b26aa8d9dea022651", 0x13, 0x7f}]) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@loopback}, &(0x7f00000001c0)=0x14) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) fallocate(r2, 0x3f, 0x2, 0x2) 15:09:29 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {0x4}, {0x7}, {0x3}, {0x6}]}) 15:09:29 executing program 0: getgroups(0x2, &(0x7f0000000140)=[0x0, 0xee00]) setresgid(r0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) setgid(0x0) 15:09:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x38, 0x1, 0x4, 0x801, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_MODE={0xa}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8}]}, 0x38}}, 0x0) [ 129.255286] audit: type=1326 audit(1663600169.905:11): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4048 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9f72844b19 code=0x0 [ 129.259242] EXT4-fs error (device loop6): ext4_quota_enable:6781: comm syz-executor.6: Bad quota inode # 4 [ 129.260089] EXT4-fs warning (device loop6): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 129.267044] EXT4-fs (loop6): mount failed 15:09:29 executing program 3: setregid(0x0, 0xee00) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) 15:09:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000001e00), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 15:09:29 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {0x4}, {0x7}, {0x3}, {0x6}]}) 15:09:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x38, 0x1, 0x4, 0x801, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_MODE={0xa}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8}]}, 0x38}}, 0x0) [ 129.350481] audit: type=1326 audit(1663600170.000:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4067 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9f72844b19 code=0x0 15:09:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)) 15:09:30 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf470, 0x6, @perf_config_ext={0x9, 0x4}, 0x40021, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1be2f630}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) process_vm_readv(r2, &(0x7f0000000a00)=[{&(0x7f0000000600)=""/252, 0xfc}, {&(0x7f0000000140)}, {&(0x7f0000000700)=""/121, 0x79}, {&(0x7f0000000840)=""/171, 0xab}, {0x0}, {&(0x7f0000000900)=""/209, 0xd1}], 0x6, &(0x7f0000000400), 0x0, 0x0) clone3(&(0x7f0000000480)={0x100008100, &(0x7f0000000040), &(0x7f0000000100), 0x0, {0x3}, &(0x7f00000003c0)=""/147, 0x93, 0x0, &(0x7f0000000300)=[0x0, 0x0, r2], 0x3}, 0x58) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) 15:09:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000001e00), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) [ 129.434456] loop6: detected capacity change from 0 to 4096 15:09:30 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {0x4}, {0x7}, {0x3}, {0x6}]}) 15:09:30 executing program 3: setregid(0x0, 0xee00) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) 15:09:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x38, 0x1, 0x4, 0x801, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_MODE={0xa}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8}]}, 0x38}}, 0x0) [ 129.495353] EXT4-fs error (device loop6): ext4_quota_enable:6781: comm syz-executor.6: Bad quota inode # 4 [ 129.496261] EXT4-fs warning (device loop6): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 129.505518] audit: type=1326 audit(1663600170.154:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4080 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9f72844b19 code=0x0 [ 129.507645] EXT4-fs (loop6): mount failed 15:09:30 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf470, 0x6, @perf_config_ext={0x9, 0x4}, 0x40021, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1be2f630}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) process_vm_readv(r2, &(0x7f0000000a00)=[{&(0x7f0000000600)=""/252, 0xfc}, {&(0x7f0000000140)}, {&(0x7f0000000700)=""/121, 0x79}, {&(0x7f0000000840)=""/171, 0xab}, {0x0}, {&(0x7f0000000900)=""/209, 0xd1}], 0x6, &(0x7f0000000400), 0x0, 0x0) clone3(&(0x7f0000000480)={0x100008100, &(0x7f0000000040), &(0x7f0000000100), 0x0, {0x3}, &(0x7f00000003c0)=""/147, 0x93, 0x0, &(0x7f0000000300)=[0x0, 0x0, r2], 0x3}, 0x58) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) 15:09:30 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000340)={0x2, 0x4, 0x1, 0x8000, 0x5, [{0x7fff, 0xffff, 0x7f, '\x00', 0x800}, {0x1, 0xee16, 0x86, '\x00', 0x48a}, {0x8, 0x9, 0x9, '\x00', 0x3000}, {0x3, 0x10000, 0x7, '\x00', 0x3080}, {0x9, 0x8, 0x10000, '\x00', 0x3105}]}) sendmsg$nl_xfrm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6, 0x4, {0x83}}]}, 0x1c}}, 0x0) io_submit(0x0, 0x2, &(0x7f0000000480)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x8, 0xffffffffffffffff, &(0x7f0000000000)="aee60b9d3a16bf3a0d8f84f70adfb0d08dabbd09704165008be1315c6ce97074b640dda589f635ce9b68e9fb11261eb08eebe7583173caf4f348a65a57f974619ac98150491b3f637856cc6ba82696ed7f5e64b960518203f82de637e0a3d943372f48f716ae5f47a0d23a", 0x6b, 0x0, 0x0, 0x2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x3, r0, &(0x7f0000000240)="35883ddb17a16d0a79de2b26aa8d9dea022651", 0x13, 0x7f}]) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@loopback}, &(0x7f00000001c0)=0x14) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) fallocate(r2, 0x3f, 0x2, 0x2) 15:09:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000001e00), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 15:09:30 executing program 7: setregid(0x0, 0xee00) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) 15:09:30 executing program 3: setregid(0x0, 0xee00) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) 15:09:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x38, 0x1, 0x4, 0x801, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_MODE={0xa}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8}]}, 0x38}}, 0x0) 15:09:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)) [ 129.699144] loop6: detected capacity change from 0 to 4096 15:09:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000001e00), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 15:09:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000001e00), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 15:09:30 executing program 2: prctl$PR_MCE_KILL(0x21, 0x1, 0x0) [ 129.773452] EXT4-fs error (device loop6): ext4_quota_enable:6781: comm syz-executor.6: Bad quota inode # 4 [ 129.792302] EXT4-fs warning (device loop6): ext4_enable_quotas:6818: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. 15:09:30 executing program 7: setregid(0x0, 0xee00) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) 15:09:30 executing program 3: setregid(0x0, 0xee00) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) [ 129.821039] EXT4-fs (loop6): mount failed 15:09:30 executing program 2: prctl$PR_MCE_KILL(0x21, 0x1, 0x0) 15:09:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000001e00), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 15:09:30 executing program 7: setregid(0x0, 0xee00) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) 15:09:30 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012f00)) [ 129.945473] loop0: detected capacity change from 0 to 2048 [ 129.960766] hrtimer: interrupt took 19367 ns [ 129.965408] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 129.966088] EXT4-fs (loop0): group descriptors corrupted! 15:09:30 executing program 7: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x10}, 0x10}}, 0x0) connect$netlink(r0, &(0x7f0000000440)=@proc={0x10, 0x0, 0x0, 0x400000}, 0xc) 15:09:30 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) 15:09:30 executing program 2: prctl$PR_MCE_KILL(0x21, 0x1, 0x0) 15:09:30 executing program 3: syz_io_uring_setup(0x2877, &(0x7f0000000080), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 15:09:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000001e00), 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 15:09:30 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000340)={0x2, 0x4, 0x1, 0x8000, 0x5, [{0x7fff, 0xffff, 0x7f, '\x00', 0x800}, {0x1, 0xee16, 0x86, '\x00', 0x48a}, {0x8, 0x9, 0x9, '\x00', 0x3000}, {0x3, 0x10000, 0x7, '\x00', 0x3080}, {0x9, 0x8, 0x10000, '\x00', 0x3105}]}) sendmsg$nl_xfrm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6, 0x4, {0x83}}]}, 0x1c}}, 0x0) io_submit(0x0, 0x2, &(0x7f0000000480)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x8, 0xffffffffffffffff, &(0x7f0000000000)="aee60b9d3a16bf3a0d8f84f70adfb0d08dabbd09704165008be1315c6ce97074b640dda589f635ce9b68e9fb11261eb08eebe7583173caf4f348a65a57f974619ac98150491b3f637856cc6ba82696ed7f5e64b960518203f82de637e0a3d943372f48f716ae5f47a0d23a", 0x6b, 0x0, 0x0, 0x2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x3, r0, &(0x7f0000000240)="35883ddb17a16d0a79de2b26aa8d9dea022651", 0x13, 0x7f}]) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@loopback}, &(0x7f00000001c0)=0x14) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) fallocate(r2, 0x3f, 0x2, 0x2) 15:09:30 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012f00)) 15:09:30 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg$unix(r0, &(0x7f0000009880)=[{{&(0x7f0000005e00)=@abs, 0x6e, &(0x7f0000006580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0, 0x0) 15:09:30 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x891d, &(0x7f0000001300)={'wlan0\x00'}) [ 130.170511] loop0: detected capacity change from 0 to 2048 [ 130.202421] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 130.203237] EXT4-fs (loop0): group descriptors corrupted! 15:09:30 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, 0x0, 0x0) 15:09:30 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) 15:09:30 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000140)={{0x77359400}, {0x0, 0x989680}}, 0x0) [ 130.342126] loop0: detected capacity change from 0 to 2048 [ 130.344302] audit: type=1400 audit(1663600170.994:14): avc: denied { block_suspend } for pid=4151 comm="syz-executor.3" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 15:09:30 executing program 1: syz_emit_ethernet(0x8b, &(0x7f0000000000)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x55, 0x2c, 0x0, @private1, @local, {[@routing={0x88}], {0x0, 0x0, 0x4c, 0x0, @opaque="bd4c908e01433afa20804a2b340fe4e5cd7642eb2d27348ad808ec06894b4ed2afe8397426f0f14f6f85c5dad0f91a6982d532fc743ee341184631719122187ed5e08cf13a"}}}}}}, 0x0) 15:09:30 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012f00)) 15:09:30 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000340)={0x2, 0x4, 0x1, 0x8000, 0x5, [{0x7fff, 0xffff, 0x7f, '\x00', 0x800}, {0x1, 0xee16, 0x86, '\x00', 0x48a}, {0x8, 0x9, 0x9, '\x00', 0x3000}, {0x3, 0x10000, 0x7, '\x00', 0x3080}, {0x9, 0x8, 0x10000, '\x00', 0x3105}]}) sendmsg$nl_xfrm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6, 0x4, {0x83}}]}, 0x1c}}, 0x0) io_submit(0x0, 0x2, &(0x7f0000000480)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x8, 0xffffffffffffffff, &(0x7f0000000000)="aee60b9d3a16bf3a0d8f84f70adfb0d08dabbd09704165008be1315c6ce97074b640dda589f635ce9b68e9fb11261eb08eebe7583173caf4f348a65a57f974619ac98150491b3f637856cc6ba82696ed7f5e64b960518203f82de637e0a3d943372f48f716ae5f47a0d23a", 0x6b, 0x0, 0x0, 0x2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x3, r0, &(0x7f0000000240)="35883ddb17a16d0a79de2b26aa8d9dea022651", 0x13, 0x7f}]) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@loopback}, &(0x7f00000001c0)=0x14) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) fallocate(r2, 0x3f, 0x2, 0x2) 15:09:30 executing program 3: r0 = epoll_create(0x1) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) epoll_pwait(r0, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) 15:09:30 executing program 2: prctl$PR_MCE_KILL(0x21, 0x1, 0x0) [ 130.364604] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 130.365351] EXT4-fs (loop0): group descriptors corrupted! 15:09:31 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fgetxattr(r0, &(0x7f0000000040)=@random={'security.', '(\x00'}, 0x0, 0x0) 15:09:31 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) 15:09:31 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000012f00)) 15:09:31 executing program 3: r0 = epoll_create(0x1) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) epoll_pwait(r0, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) 15:09:31 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x0, @fixed, 0x0, 0x3}, 0xe) 15:09:31 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000140)={{0x77359400}, {0x0, 0x989680}}, 0x0) [ 130.543821] loop0: detected capacity change from 0 to 2048 [ 130.549236] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 130.549973] EXT4-fs (loop0): group descriptors corrupted! 15:09:31 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) 15:09:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0}, 0x2000c040) listen(r0, 0x0) 15:09:31 executing program 3: r0 = epoll_create(0x1) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) epoll_pwait(r0, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) 15:09:31 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x0, @fixed, 0x0, 0x3}, 0xe) 15:09:31 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000140)={{0x77359400}, {0x0, 0x989680}}, 0x0) 15:09:31 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000940), 0xffffffffffffffff) 15:09:31 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000140)={{0x77359400}, {0x0, 0x989680}}, 0x0) 15:09:31 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x0, @fixed, 0x0, 0x3}, 0xe) 15:09:31 executing program 1: syz_emit_ethernet(0x4b0a, 0x0, 0x0) 15:09:31 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140)) 15:09:31 executing program 3: r0 = epoll_create(0x1) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x60000017}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) epoll_pwait(r0, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) 15:09:31 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x0, @fixed, 0x0, 0x3}, 0xe) 15:09:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/softnet_stat\x00') writev(r0, &(0x7f0000000180)=[{&(0x7f0000000000)=' ', 0x1}], 0x1) 15:09:31 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) 15:09:31 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x5601, 0x0) 15:09:31 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000180)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) timer_gettime(0x0, &(0x7f0000000000)) 15:09:31 executing program 2: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) ioctl$CDROMREADAUDIO(r0, 0x530e, &(0x7f0000000180)={@msf, 0x1, 0x19, &(0x7f0000000140)=""/25}) 15:09:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000080), 0x0, 0x8) 15:09:31 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x5601, 0x0) 15:09:31 executing program 3: pipe2(&(0x7f0000000840), 0x84800) pipe2(&(0x7f00000010c0), 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f00000012c0), 0x10b800, 0x0) 15:09:31 executing program 1: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x0) 15:09:31 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW(r0, 0x4b65, 0x0) [ 130.918154] cdrom: dropping to single frame dma 15:09:31 executing program 1: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x0) 15:09:31 executing program 4: syz_emit_ethernet(0xbe, &(0x7f00000000c0)={@local, @empty, @void, {@ipv4={0x892f, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x0, 0x9c, 0x0, @wg}}}}}, 0x0) 15:09:31 executing program 1: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x0) 15:09:31 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x5601, 0x0) 15:09:31 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8931, &(0x7f0000001300)={'wlan0\x00'}) 15:09:31 executing program 7: syz_open_dev$ttys(0xc, 0x2, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0x8001}]) 15:09:31 executing program 5: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$hiddev(r0, 0x0, 0x0) [ 130.991315] loop7: detected capacity change from 0 to 128 15:09:31 executing program 1: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x0) 15:09:31 executing program 6: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r1, r0, 0x0, 0xfffffdef) 15:09:31 executing program 2: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) ioctl$CDROMREADAUDIO(r0, 0x530e, &(0x7f0000000180)={@msf, 0x1, 0x19, &(0x7f0000000140)=""/25}) 15:09:31 executing program 3: clock_nanosleep(0x7, 0x0, &(0x7f0000000840), 0x0) 15:09:31 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8931, &(0x7f0000001300)={'wlan0\x00'}) 15:09:31 executing program 5: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$hiddev(r0, 0x0, 0x0) 15:09:31 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000540), 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, 0x0) 15:09:31 executing program 7: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000080)='^@)^^D\xf6\x80Ds:#\x00\xf5\xde \xef\x9b\xdc_\xa9\xcc?\x1b\x9c\x8aD\x8e\x13=\'zs\ts\xbc\x9d\xec}\x81\x82\xe4s\x80e\xe3\x88\xc4\x8bo\x13\x06r\x13\xc0\x1b\x87\x93`\\\xe3/b\a\xe6\xb6\x19}\xa6\xca]a\xacmc\xf5\xc6\xf7V\x90\xba`\x97\xa7.\x8cL:\xf5^\xb8mT\xae\x1b\xfc\xa1\xeb\x19\xc9:\x7f\xc6+\t\xec\b\x00\xf5j\t\xa9\xb0j\xea\x99\x80\xd25\xe5\xad1R\r\x8a\x9f(\xd0-%\xa0\x99\xb8\x9c\xdf\v\x05\x88\xe1\x1c\x1eu\xe7y+\xdc', 0x0) ftruncate(r0, 0x0) [ 131.118311] loop6: detected capacity change from 0 to 40 15:09:31 executing program 2: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) ioctl$CDROMREADAUDIO(r0, 0x530e, &(0x7f0000000180)={@msf, 0x1, 0x19, &(0x7f0000000140)=""/25}) [ 131.953902] syz-executor.6: attempt to access beyond end of device [ 131.953902] loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 131.955623] Buffer I/O error on dev loop6, logical block 10, lost async page write 15:09:32 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x5601, 0x0) 15:09:32 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8931, &(0x7f0000001300)={'wlan0\x00'}) 15:09:32 executing program 6: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r1, r0, 0x0, 0xfffffdef) 15:09:32 executing program 5: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$hiddev(r0, 0x0, 0x0) 15:09:32 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3, 0x1, 0xd6c3}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000140)=0x100, 0x4) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4850}, 0x8041) 15:09:32 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000011c0)=""/4096) 15:09:32 executing program 1: syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000001340)=[{&(0x7f0000001180)="260c2227cc437779885af489d4c96d7c33f81078333dedbe09a04d71b843f33fab3a34c080", 0x25, 0x9}, {&(0x7f0000001200)="817ca19976c7e9a8c231ef907c816e5da8153d72", 0x14, 0x7}, {&(0x7f0000001240)="be3ce4cd8f11413c3d4a1f720d4a36101faa959f79888c6d6590a0ae4f9d9094eb8467313d5ffe7c9d021dcedadb6d6b1658ee233355fca5a4b5e48819b3e286c48b9520f8616fb670f05d42fe4326ca3a9f91a8e7c3a52e337f90e91851f85ae35a87cc1d3185d0882e6975222ded3ed5da5bc7758f07b4975fbe0ac49791431a2a03584d515c87bad0913fd58d69502e1345a320eec56b11da12aa44af696e0739f2c9f0e22d018f", 0xa9, 0x1}, {&(0x7f0000001300), 0x0, 0x2}], 0x1a41012, &(0x7f00000013c0)={[{@mpol={'mpol', 0x3d, {'interleave', '', @void}}}, {@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x39, 0x3a, 0x2c, 0x2d, 0x35, 0x15, 0x38]}}}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x37, 0x37, 0x64, 0x64, 0x65, 0x35], 0x2d, [0x1, 0x63, 0x62, 0x32], 0x2d, [0x61, 0x38, 0x30, 0x64], 0x2d, [0x64, 0x65, 0x31, 0x34], 0x2d, [0x39, 0x65, 0x37, 0x32, 0x33, 0x35, 0x62, 0x64]}}}]}) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x531081, 0x0) r2 = inotify_init1(0x0) dup2(r2, r1) 15:09:32 executing program 2: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) ioctl$CDROMREADAUDIO(r0, 0x530e, &(0x7f0000000180)={@msf, 0x1, 0x19, &(0x7f0000000140)=""/25}) [ 132.117322] loop6: detected capacity change from 0 to 40 [ 132.327459] syz-executor.6: attempt to access beyond end of device [ 132.327459] loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 132.329498] Buffer I/O error on dev loop6, logical block 10, lost async page write 15:09:33 executing program 5: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$hiddev(r0, 0x0, 0x0) 15:09:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000000500)=[{{&(0x7f0000000280)={0xa, 0x4e22, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40}, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="840ed7cb019cc4c626bd522b9b297ab0228f"}, {&(0x7f0000000440)="f117c9546fdf673e848c4c40aae7d578e6a70ca6261a43b646cf390b39b5b5f8e490cbc2954c666512f0df544eee3737d7dfed7d929427a7110deb7349410be3c1ce5c55ab6187bb39dc6908fd34b3b34203a5184310cdcb173d03bad191e46181"}, {&(0x7f0000000300)="9fb8735a86"}]}}], 0x63, 0x24048894) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 15:09:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r0, 0x0, 0x6, &(0x7f0000000080)="9f", 0x1) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000300)="6fb9", 0x2}, {&(0x7f00000000c0)="ba7b2eaf62c1", 0x6}], 0x2, &(0x7f00000001c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4}]}}}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 15:09:33 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3, 0x1, 0xd6c3}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000140)=0x100, 0x4) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4850}, 0x8041) 15:09:33 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8931, &(0x7f0000001300)={'wlan0\x00'}) 15:09:33 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000011c0)=""/4096) 15:09:33 executing program 6: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r1, r0, 0x0, 0xfffffdef) 15:09:33 executing program 1: syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000001340)=[{&(0x7f0000001180)="260c2227cc437779885af489d4c96d7c33f81078333dedbe09a04d71b843f33fab3a34c080", 0x25, 0x9}, {&(0x7f0000001200)="817ca19976c7e9a8c231ef907c816e5da8153d72", 0x14, 0x7}, {&(0x7f0000001240)="be3ce4cd8f11413c3d4a1f720d4a36101faa959f79888c6d6590a0ae4f9d9094eb8467313d5ffe7c9d021dcedadb6d6b1658ee233355fca5a4b5e48819b3e286c48b9520f8616fb670f05d42fe4326ca3a9f91a8e7c3a52e337f90e91851f85ae35a87cc1d3185d0882e6975222ded3ed5da5bc7758f07b4975fbe0ac49791431a2a03584d515c87bad0913fd58d69502e1345a320eec56b11da12aa44af696e0739f2c9f0e22d018f", 0xa9, 0x1}, {&(0x7f0000001300), 0x0, 0x2}], 0x1a41012, &(0x7f00000013c0)={[{@mpol={'mpol', 0x3d, {'interleave', '', @void}}}, {@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x39, 0x3a, 0x2c, 0x2d, 0x35, 0x15, 0x38]}}}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x37, 0x37, 0x64, 0x64, 0x65, 0x35], 0x2d, [0x1, 0x63, 0x62, 0x32], 0x2d, [0x61, 0x38, 0x30, 0x64], 0x2d, [0x64, 0x65, 0x31, 0x34], 0x2d, [0x39, 0x65, 0x37, 0x32, 0x33, 0x35, 0x62, 0x64]}}}]}) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x531081, 0x0) r2 = inotify_init1(0x0) dup2(r2, r1) [ 132.419385] loop6: detected capacity change from 0 to 40 15:09:33 executing program 4: syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000001340)=[{&(0x7f0000001180)="260c2227cc437779885af489d4c96d7c33f81078333dedbe09a04d71b843f33fab3a34c080", 0x25, 0x9}, {&(0x7f0000001200)="817ca19976c7e9a8c231ef907c816e5da8153d72", 0x14, 0x7}, {&(0x7f0000001240)="be3ce4cd8f11413c3d4a1f720d4a36101faa959f79888c6d6590a0ae4f9d9094eb8467313d5ffe7c9d021dcedadb6d6b1658ee233355fca5a4b5e48819b3e286c48b9520f8616fb670f05d42fe4326ca3a9f91a8e7c3a52e337f90e91851f85ae35a87cc1d3185d0882e6975222ded3ed5da5bc7758f07b4975fbe0ac49791431a2a03584d515c87bad0913fd58d69502e1345a320eec56b11da12aa44af696e0739f2c9f0e22d018f", 0xa9, 0x1}, {&(0x7f0000001300), 0x0, 0x2}], 0x1a41012, &(0x7f00000013c0)={[{@mpol={'mpol', 0x3d, {'interleave', '', @void}}}, {@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x39, 0x3a, 0x2c, 0x2d, 0x35, 0x15, 0x38]}}}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x37, 0x37, 0x64, 0x64, 0x65, 0x35], 0x2d, [0x1, 0x63, 0x62, 0x32], 0x2d, [0x61, 0x38, 0x30, 0x64], 0x2d, [0x64, 0x65, 0x31, 0x34], 0x2d, [0x39, 0x65, 0x37, 0x32, 0x33, 0x35, 0x62, 0x64]}}}]}) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x531081, 0x0) r2 = inotify_init1(0x0) dup2(r2, r1) 15:09:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r0, 0x0, 0x6, &(0x7f0000000080)="9f", 0x1) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000300)="6fb9", 0x2}, {&(0x7f00000000c0)="ba7b2eaf62c1", 0x6}], 0x2, &(0x7f00000001c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4}]}}}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 15:09:33 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000011c0)=""/4096) 15:09:33 executing program 5: syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000001340)=[{&(0x7f0000001180)="260c2227cc437779885af489d4c96d7c33f81078333dedbe09a04d71b843f33fab3a34c080", 0x25, 0x9}, {&(0x7f0000001200)="817ca19976c7e9a8c231ef907c816e5da8153d72", 0x14, 0x7}, {&(0x7f0000001240)="be3ce4cd8f11413c3d4a1f720d4a36101faa959f79888c6d6590a0ae4f9d9094eb8467313d5ffe7c9d021dcedadb6d6b1658ee233355fca5a4b5e48819b3e286c48b9520f8616fb670f05d42fe4326ca3a9f91a8e7c3a52e337f90e91851f85ae35a87cc1d3185d0882e6975222ded3ed5da5bc7758f07b4975fbe0ac49791431a2a03584d515c87bad0913fd58d69502e1345a320eec56b11da12aa44af696e0739f2c9f0e22d018f", 0xa9, 0x1}, {&(0x7f0000001300), 0x0, 0x2}], 0x1a41012, &(0x7f00000013c0)={[{@mpol={'mpol', 0x3d, {'interleave', '', @void}}}, {@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x39, 0x3a, 0x2c, 0x2d, 0x35, 0x15, 0x38]}}}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x37, 0x37, 0x64, 0x64, 0x65, 0x35], 0x2d, [0x1, 0x63, 0x62, 0x32], 0x2d, [0x61, 0x38, 0x30, 0x64], 0x2d, [0x64, 0x65, 0x31, 0x34], 0x2d, [0x39, 0x65, 0x37, 0x32, 0x33, 0x35, 0x62, 0x64]}}}]}) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x531081, 0x0) r2 = inotify_init1(0x0) dup2(r2, r1) 15:09:33 executing program 1: syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000001340)=[{&(0x7f0000001180)="260c2227cc437779885af489d4c96d7c33f81078333dedbe09a04d71b843f33fab3a34c080", 0x25, 0x9}, {&(0x7f0000001200)="817ca19976c7e9a8c231ef907c816e5da8153d72", 0x14, 0x7}, {&(0x7f0000001240)="be3ce4cd8f11413c3d4a1f720d4a36101faa959f79888c6d6590a0ae4f9d9094eb8467313d5ffe7c9d021dcedadb6d6b1658ee233355fca5a4b5e48819b3e286c48b9520f8616fb670f05d42fe4326ca3a9f91a8e7c3a52e337f90e91851f85ae35a87cc1d3185d0882e6975222ded3ed5da5bc7758f07b4975fbe0ac49791431a2a03584d515c87bad0913fd58d69502e1345a320eec56b11da12aa44af696e0739f2c9f0e22d018f", 0xa9, 0x1}, {&(0x7f0000001300), 0x0, 0x2}], 0x1a41012, &(0x7f00000013c0)={[{@mpol={'mpol', 0x3d, {'interleave', '', @void}}}, {@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x39, 0x3a, 0x2c, 0x2d, 0x35, 0x15, 0x38]}}}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x37, 0x37, 0x64, 0x64, 0x65, 0x35], 0x2d, [0x1, 0x63, 0x62, 0x32], 0x2d, [0x61, 0x38, 0x30, 0x64], 0x2d, [0x64, 0x65, 0x31, 0x34], 0x2d, [0x39, 0x65, 0x37, 0x32, 0x33, 0x35, 0x62, 0x64]}}}]}) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x531081, 0x0) r2 = inotify_init1(0x0) dup2(r2, r1) [ 132.527987] syz-executor.6: attempt to access beyond end of device [ 132.527987] loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 132.529159] Buffer I/O error on dev loop6, logical block 10, lost async page write 15:09:33 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000011c0)=""/4096) 15:09:33 executing program 4: syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000001340)=[{&(0x7f0000001180)="260c2227cc437779885af489d4c96d7c33f81078333dedbe09a04d71b843f33fab3a34c080", 0x25, 0x9}, {&(0x7f0000001200)="817ca19976c7e9a8c231ef907c816e5da8153d72", 0x14, 0x7}, {&(0x7f0000001240)="be3ce4cd8f11413c3d4a1f720d4a36101faa959f79888c6d6590a0ae4f9d9094eb8467313d5ffe7c9d021dcedadb6d6b1658ee233355fca5a4b5e48819b3e286c48b9520f8616fb670f05d42fe4326ca3a9f91a8e7c3a52e337f90e91851f85ae35a87cc1d3185d0882e6975222ded3ed5da5bc7758f07b4975fbe0ac49791431a2a03584d515c87bad0913fd58d69502e1345a320eec56b11da12aa44af696e0739f2c9f0e22d018f", 0xa9, 0x1}, {&(0x7f0000001300), 0x0, 0x2}], 0x1a41012, &(0x7f00000013c0)={[{@mpol={'mpol', 0x3d, {'interleave', '', @void}}}, {@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x39, 0x3a, 0x2c, 0x2d, 0x35, 0x15, 0x38]}}}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x37, 0x37, 0x64, 0x64, 0x65, 0x35], 0x2d, [0x1, 0x63, 0x62, 0x32], 0x2d, [0x61, 0x38, 0x30, 0x64], 0x2d, [0x64, 0x65, 0x31, 0x34], 0x2d, [0x39, 0x65, 0x37, 0x32, 0x33, 0x35, 0x62, 0x64]}}}]}) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x531081, 0x0) r2 = inotify_init1(0x0) dup2(r2, r1) 15:09:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r0, 0x0, 0x6, &(0x7f0000000080)="9f", 0x1) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000300)="6fb9", 0x2}, {&(0x7f00000000c0)="ba7b2eaf62c1", 0x6}], 0x2, &(0x7f00000001c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4}]}}}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 15:09:33 executing program 5: syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000001340)=[{&(0x7f0000001180)="260c2227cc437779885af489d4c96d7c33f81078333dedbe09a04d71b843f33fab3a34c080", 0x25, 0x9}, {&(0x7f0000001200)="817ca19976c7e9a8c231ef907c816e5da8153d72", 0x14, 0x7}, {&(0x7f0000001240)="be3ce4cd8f11413c3d4a1f720d4a36101faa959f79888c6d6590a0ae4f9d9094eb8467313d5ffe7c9d021dcedadb6d6b1658ee233355fca5a4b5e48819b3e286c48b9520f8616fb670f05d42fe4326ca3a9f91a8e7c3a52e337f90e91851f85ae35a87cc1d3185d0882e6975222ded3ed5da5bc7758f07b4975fbe0ac49791431a2a03584d515c87bad0913fd58d69502e1345a320eec56b11da12aa44af696e0739f2c9f0e22d018f", 0xa9, 0x1}, {&(0x7f0000001300), 0x0, 0x2}], 0x1a41012, &(0x7f00000013c0)={[{@mpol={'mpol', 0x3d, {'interleave', '', @void}}}, {@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x39, 0x3a, 0x2c, 0x2d, 0x35, 0x15, 0x38]}}}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x37, 0x37, 0x64, 0x64, 0x65, 0x35], 0x2d, [0x1, 0x63, 0x62, 0x32], 0x2d, [0x61, 0x38, 0x30, 0x64], 0x2d, [0x64, 0x65, 0x31, 0x34], 0x2d, [0x39, 0x65, 0x37, 0x32, 0x33, 0x35, 0x62, 0x64]}}}]}) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x531081, 0x0) r2 = inotify_init1(0x0) dup2(r2, r1) 15:09:33 executing program 6: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r1, r0, 0x0, 0xfffffdef) 15:09:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000000500)=[{{&(0x7f0000000280)={0xa, 0x4e22, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40}, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="840ed7cb019cc4c626bd522b9b297ab0228f"}, {&(0x7f0000000440)="f117c9546fdf673e848c4c40aae7d578e6a70ca6261a43b646cf390b39b5b5f8e490cbc2954c666512f0df544eee3737d7dfed7d929427a7110deb7349410be3c1ce5c55ab6187bb39dc6908fd34b3b34203a5184310cdcb173d03bad191e46181"}, {&(0x7f0000000300)="9fb8735a86"}]}}], 0x63, 0x24048894) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 15:09:33 executing program 1: syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000001340)=[{&(0x7f0000001180)="260c2227cc437779885af489d4c96d7c33f81078333dedbe09a04d71b843f33fab3a34c080", 0x25, 0x9}, {&(0x7f0000001200)="817ca19976c7e9a8c231ef907c816e5da8153d72", 0x14, 0x7}, {&(0x7f0000001240)="be3ce4cd8f11413c3d4a1f720d4a36101faa959f79888c6d6590a0ae4f9d9094eb8467313d5ffe7c9d021dcedadb6d6b1658ee233355fca5a4b5e48819b3e286c48b9520f8616fb670f05d42fe4326ca3a9f91a8e7c3a52e337f90e91851f85ae35a87cc1d3185d0882e6975222ded3ed5da5bc7758f07b4975fbe0ac49791431a2a03584d515c87bad0913fd58d69502e1345a320eec56b11da12aa44af696e0739f2c9f0e22d018f", 0xa9, 0x1}, {&(0x7f0000001300), 0x0, 0x2}], 0x1a41012, &(0x7f00000013c0)={[{@mpol={'mpol', 0x3d, {'interleave', '', @void}}}, {@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x39, 0x3a, 0x2c, 0x2d, 0x35, 0x15, 0x38]}}}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x37, 0x37, 0x64, 0x64, 0x65, 0x35], 0x2d, [0x1, 0x63, 0x62, 0x32], 0x2d, [0x61, 0x38, 0x30, 0x64], 0x2d, [0x64, 0x65, 0x31, 0x34], 0x2d, [0x39, 0x65, 0x37, 0x32, 0x33, 0x35, 0x62, 0x64]}}}]}) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x531081, 0x0) r2 = inotify_init1(0x0) dup2(r2, r1) 15:09:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000000500)=[{{&(0x7f0000000280)={0xa, 0x4e22, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40}, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="840ed7cb019cc4c626bd522b9b297ab0228f"}, {&(0x7f0000000440)="f117c9546fdf673e848c4c40aae7d578e6a70ca6261a43b646cf390b39b5b5f8e490cbc2954c666512f0df544eee3737d7dfed7d929427a7110deb7349410be3c1ce5c55ab6187bb39dc6908fd34b3b34203a5184310cdcb173d03bad191e46181"}, {&(0x7f0000000300)="9fb8735a86"}]}}], 0x63, 0x24048894) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) [ 132.737802] loop6: detected capacity change from 0 to 40 15:09:33 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3, 0x1, 0xd6c3}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000140)=0x100, 0x4) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4850}, 0x8041) 15:09:33 executing program 4: syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000001340)=[{&(0x7f0000001180)="260c2227cc437779885af489d4c96d7c33f81078333dedbe09a04d71b843f33fab3a34c080", 0x25, 0x9}, {&(0x7f0000001200)="817ca19976c7e9a8c231ef907c816e5da8153d72", 0x14, 0x7}, {&(0x7f0000001240)="be3ce4cd8f11413c3d4a1f720d4a36101faa959f79888c6d6590a0ae4f9d9094eb8467313d5ffe7c9d021dcedadb6d6b1658ee233355fca5a4b5e48819b3e286c48b9520f8616fb670f05d42fe4326ca3a9f91a8e7c3a52e337f90e91851f85ae35a87cc1d3185d0882e6975222ded3ed5da5bc7758f07b4975fbe0ac49791431a2a03584d515c87bad0913fd58d69502e1345a320eec56b11da12aa44af696e0739f2c9f0e22d018f", 0xa9, 0x1}, {&(0x7f0000001300), 0x0, 0x2}], 0x1a41012, &(0x7f00000013c0)={[{@mpol={'mpol', 0x3d, {'interleave', '', @void}}}, {@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x39, 0x3a, 0x2c, 0x2d, 0x35, 0x15, 0x38]}}}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x37, 0x37, 0x64, 0x64, 0x65, 0x35], 0x2d, [0x1, 0x63, 0x62, 0x32], 0x2d, [0x61, 0x38, 0x30, 0x64], 0x2d, [0x64, 0x65, 0x31, 0x34], 0x2d, [0x39, 0x65, 0x37, 0x32, 0x33, 0x35, 0x62, 0x64]}}}]}) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x531081, 0x0) r2 = inotify_init1(0x0) dup2(r2, r1) 15:09:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r0, 0x0, 0x6, &(0x7f0000000080)="9f", 0x1) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000300)="6fb9", 0x2}, {&(0x7f00000000c0)="ba7b2eaf62c1", 0x6}], 0x2, &(0x7f00000001c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4}]}}}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 15:09:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000000500)=[{{&(0x7f0000000280)={0xa, 0x4e22, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40}, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="840ed7cb019cc4c626bd522b9b297ab0228f"}, {&(0x7f0000000440)="f117c9546fdf673e848c4c40aae7d578e6a70ca6261a43b646cf390b39b5b5f8e490cbc2954c666512f0df544eee3737d7dfed7d929427a7110deb7349410be3c1ce5c55ab6187bb39dc6908fd34b3b34203a5184310cdcb173d03bad191e46181"}, {&(0x7f0000000300)="9fb8735a86"}]}}], 0x63, 0x24048894) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 15:09:33 executing program 5: syz_io_uring_setup(0x7969, &(0x7f00000001c0)={0x0, 0xfc32, 0x0, 0x3, 0x109}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000240)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000001340)=[{&(0x7f0000001180)="260c2227cc437779885af489d4c96d7c33f81078333dedbe09a04d71b843f33fab3a34c080", 0x25, 0x9}, {&(0x7f0000001200)="817ca19976c7e9a8c231ef907c816e5da8153d72", 0x14, 0x7}, {&(0x7f0000001240)="be3ce4cd8f11413c3d4a1f720d4a36101faa959f79888c6d6590a0ae4f9d9094eb8467313d5ffe7c9d021dcedadb6d6b1658ee233355fca5a4b5e48819b3e286c48b9520f8616fb670f05d42fe4326ca3a9f91a8e7c3a52e337f90e91851f85ae35a87cc1d3185d0882e6975222ded3ed5da5bc7758f07b4975fbe0ac49791431a2a03584d515c87bad0913fd58d69502e1345a320eec56b11da12aa44af696e0739f2c9f0e22d018f", 0xa9, 0x1}, {&(0x7f0000001300), 0x0, 0x2}], 0x1a41012, &(0x7f00000013c0)={[{@mpol={'mpol', 0x3d, {'interleave', '', @void}}}, {@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x39, 0x3a, 0x2c, 0x2d, 0x35, 0x15, 0x38]}}}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x63, 0x37, 0x37, 0x64, 0x64, 0x65, 0x35], 0x2d, [0x1, 0x63, 0x62, 0x32], 0x2d, [0x61, 0x38, 0x30, 0x64], 0x2d, [0x64, 0x65, 0x31, 0x34], 0x2d, [0x39, 0x65, 0x37, 0x32, 0x33, 0x35, 0x62, 0x64]}}}]}) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x531081, 0x0) r2 = inotify_init1(0x0) dup2(r2, r1) [ 132.877582] syz-executor.6: attempt to access beyond end of device [ 132.877582] loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 132.878872] Buffer I/O error on dev loop6, logical block 10, lost async page write 15:09:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000000500)=[{{&(0x7f0000000280)={0xa, 0x4e22, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40}, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="840ed7cb019cc4c626bd522b9b297ab0228f"}, {&(0x7f0000000440)="f117c9546fdf673e848c4c40aae7d578e6a70ca6261a43b646cf390b39b5b5f8e490cbc2954c666512f0df544eee3737d7dfed7d929427a7110deb7349410be3c1ce5c55ab6187bb39dc6908fd34b3b34203a5184310cdcb173d03bad191e46181"}, {&(0x7f0000000300)="9fb8735a86"}]}}], 0x63, 0x24048894) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 15:09:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000000500)=[{{&(0x7f0000000280)={0xa, 0x4e22, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40}, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="840ed7cb019cc4c626bd522b9b297ab0228f"}, {&(0x7f0000000440)="f117c9546fdf673e848c4c40aae7d578e6a70ca6261a43b646cf390b39b5b5f8e490cbc2954c666512f0df544eee3737d7dfed7d929427a7110deb7349410be3c1ce5c55ab6187bb39dc6908fd34b3b34203a5184310cdcb173d03bad191e46181"}, {&(0x7f0000000300)="9fb8735a86"}]}}], 0x63, 0x24048894) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 15:09:33 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3, 0x1, 0xd6c3}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000140)=0x100, 0x4) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4850}, 0x8041) 15:09:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000000500)=[{{&(0x7f0000000280)={0xa, 0x4e22, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40}, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="840ed7cb019cc4c626bd522b9b297ab0228f"}, {&(0x7f0000000440)="f117c9546fdf673e848c4c40aae7d578e6a70ca6261a43b646cf390b39b5b5f8e490cbc2954c666512f0df544eee3737d7dfed7d929427a7110deb7349410be3c1ce5c55ab6187bb39dc6908fd34b3b34203a5184310cdcb173d03bad191e46181"}, {&(0x7f0000000300)="9fb8735a86"}]}}], 0x63, 0x24048894) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 15:09:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000000500)=[{{&(0x7f0000000280)={0xa, 0x4e22, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40}, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="840ed7cb019cc4c626bd522b9b297ab0228f"}, {&(0x7f0000000440)="f117c9546fdf673e848c4c40aae7d578e6a70ca6261a43b646cf390b39b5b5f8e490cbc2954c666512f0df544eee3737d7dfed7d929427a7110deb7349410be3c1ce5c55ab6187bb39dc6908fd34b3b34203a5184310cdcb173d03bad191e46181"}, {&(0x7f0000000300)="9fb8735a86"}]}}], 0x63, 0x24048894) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 15:09:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000000500)=[{{&(0x7f0000000280)={0xa, 0x4e22, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40}, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="840ed7cb019cc4c626bd522b9b297ab0228f"}, {&(0x7f0000000440)="f117c9546fdf673e848c4c40aae7d578e6a70ca6261a43b646cf390b39b5b5f8e490cbc2954c666512f0df544eee3737d7dfed7d929427a7110deb7349410be3c1ce5c55ab6187bb39dc6908fd34b3b34203a5184310cdcb173d03bad191e46181"}, {&(0x7f0000000300)="9fb8735a86"}]}}], 0x63, 0x24048894) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 15:09:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0 VM DIAGNOSIS: 15:09:28 Registers: info registers vcpu 0 RAX=0000000000000061 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b2e71 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff88800fdaf698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000061 R11=0000000000000001 R12=0000000000000061 R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b2e60 RIP=ffffffff822b2ec9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f13ffae0700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000020000280 CR3=0000000020452000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f14026517c0 00007f14026517c8 YMM02=0000000000000000 0000000000000000 00007f14026517e0 00007f14026517c0 YMM03=0000000000000000 0000000000000000 00007f14026517c8 00007f14026517c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=1ffff11008185f48 RCX=ffffffff8171516e RDX=dffffc0000000000 RSI=0000000000000008 RDI=ffffffff85b02e50 RBP=0000000000000001 RSP=ffff888040c2fa28 R8 =0000000000000000 R9 =ffffffff85b02e57 R10=fffffbfff0b605ca R11=0000000000000001 R12=0000000000000000 R13=0000000000000000 R14=ffffea0001004f00 R15=ffff888040c2fa90 RIP=ffffffff8130cae2 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007efe84054bd8 CR3=000000002061a000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00362e6f732e6362 696c2f756e672d78 YMM02=0000000000000000 0000000000000000 ffff0000000000ff ffffffffffffffff YMM03=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000