7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 28) 03:57:25 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100), 0x0, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() [ 2663.188350] loop6: detected capacity change from 0 to 4 03:57:25 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000100000000000000", 0x54, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="006e65d74591fd202655d5296c04c3d69fe822a7c4bd92567542878c83b4ef5127140a9f14aa72ecc01922520ac0334444cd41a1b3b73471dbf3064b11acfb0ed427a9ffcd9ff54eb279e399d348517a31057cdd24d4ee2ae83ccc654b4b0a3e09b3d30fee1fa11ed3001586de50ff78a08d04eb1a16479a57913b15969b1d46857999eadeb4488f69355c9c2b72894702cbaf3a77bfcee237ec4e7d2f449ccebe45a80081b67ea60dd3c392c952043b2dc6e7b6b242a414e0291a7bc6bfcbdfafc92eb8b50cfcb21688c4e636398f5c22bf6c6e4455867f0a63c2f2cb099a48910a3c6d7ac76da9647d969b5450c88e34710a2e720600000000000000f66a603371aa09a2000000000000"]) 03:57:25 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb3076", 0x2a, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() 03:57:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, 0x0) 03:57:25 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 29) [ 2663.282057] FAULT_INJECTION: forcing a failure. [ 2663.282057] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2663.282964] CPU: 0 PID: 12606 Comm: syz-executor.3 Not tainted 6.0.0-next-20221014 #1 [ 2663.283515] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2663.284080] Call Trace: [ 2663.284261] [ 2663.284427] dump_stack_lvl+0x8b/0xb3 [ 2663.284707] should_fail.cold+0x5/0xa [ 2663.284987] _copy_from_user+0x2a/0x170 [ 2663.285282] csum_and_copy_from_iter+0x626/0x1470 [ 2663.285633] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2663.285950] ? lock_release+0x3b2/0x750 [ 2663.286239] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2663.286596] ? mark_held_locks+0x9e/0xe0 [ 2663.286894] ip_generic_getfrag+0x173/0x270 [ 2663.287207] ? ip_frag_init+0x350/0x350 [ 2663.287480] ? lock_is_held_type+0xd7/0x130 [ 2663.287787] ? memset+0x20/0x50 [ 2663.288041] raw_getfrag+0x22d/0x290 [ 2663.288310] ? __alloc_skb+0x17b/0x300 [ 2663.288593] __ip_append_data+0x1d7f/0x3aa0 [ 2663.288902] ? raw_destroy+0x30/0x30 [ 2663.289176] ? perf_trace_preemptirq_template+0x274/0x420 [ 2663.289567] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2663.289921] ? lock_is_held_type+0xd7/0x130 [ 2663.290223] ? ipv4_mtu+0x28a/0x380 [ 2663.290477] ? raw_destroy+0x30/0x30 [ 2663.290745] ip_append_data+0x114/0x1a0 [ 2663.291032] raw_sendmsg+0xa97/0x2b80 [ 2663.291310] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2663.291678] ? __lock_acquire+0x164d/0x5e70 [ 2663.291990] ? raw_recvmsg+0x790/0x790 [ 2663.292277] ? __lock_acquire+0x164d/0x5e70 [ 2663.292595] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2663.292966] ? __might_fault+0xd1/0x170 [ 2663.293253] ? lock_downgrade+0x6d0/0x6d0 [ 2663.293545] ? selinux_socket_listen+0x2b0/0x2b0 [ 2663.293890] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2663.294229] ? raw_recvmsg+0x790/0x790 [ 2663.294507] inet_sendmsg+0x11d/0x140 [ 2663.294786] ? inet_send_prepare+0x4e0/0x4e0 [ 2663.295106] sock_sendmsg+0x13c/0x190 [ 2663.295380] ____sys_sendmsg+0x744/0x930 [ 2663.295669] ? kernel_sendmsg+0x50/0x50 [ 2663.295940] ? perf_mmap_fault+0x780/0x780 [ 2663.296263] ___sys_sendmsg+0x110/0x1b0 [ 2663.296549] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2663.296881] ? __fget_files+0x24e/0x450 [ 2663.297165] ? lock_downgrade+0x6d0/0x6d0 [ 2663.297464] ? lock_release+0x3b2/0x750 [ 2663.297751] ? ksys_write+0x214/0x250 [ 2663.298035] ? __fget_files+0x270/0x450 [ 2663.298326] ? __fget_light+0xe5/0x280 [ 2663.298611] __sys_sendmsg+0xf3/0x1c0 [ 2663.298869] ? __sys_sendmsg_sock+0x40/0x40 [ 2663.299189] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2663.299554] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2663.299923] do_syscall_64+0x3b/0x90 [ 2663.300184] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2663.300548] RIP: 0033:0x7f7fa6905b19 [ 2663.300813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2663.302045] RSP: 002b:00007f7fa3e7b188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2663.302568] RAX: ffffffffffffffda RBX: 00007f7fa6a18f60 RCX: 00007f7fa6905b19 [ 2663.303056] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2663.303549] RBP: 00007f7fa3e7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2663.304058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2663.304542] R13: 00007ffd9216c86f R14: 00007f7fa3e7b300 R15: 0000000000022000 [ 2663.305044] [ 2663.337679] loop6: detected capacity change from 0 to 4 [ 2663.344040] loop0: detected capacity change from 0 to 4 03:57:38 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8", 0x2d, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() 03:57:38 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 31) 03:57:39 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x10, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 03:57:39 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 30) 03:57:39 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 30) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:57:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, 0x0) 03:57:39 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100), 0x0, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 03:57:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000100000000000000", 0x54, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) [ 2676.474090] loop0: detected capacity change from 0 to 4 [ 2676.494656] loop6: detected capacity change from 0 to 4 [ 2676.525918] FAULT_INJECTION: forcing a failure. [ 2676.525918] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2676.527747] CPU: 0 PID: 12631 Comm: syz-executor.4 Not tainted 6.0.0-next-20221014 #1 [ 2676.528823] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2676.529887] Call Trace: [ 2676.530249] [ 2676.530566] dump_stack_lvl+0x8b/0xb3 [ 2676.531098] should_fail.cold+0x5/0xa [ 2676.531640] _copy_from_user+0x2a/0x170 [ 2676.532208] csum_and_copy_from_iter+0x626/0x1470 [ 2676.532881] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2676.533495] ? lock_release+0x3b2/0x750 03:57:39 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 32) [ 2676.534053] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2676.534926] ? mark_held_locks+0x9e/0xe0 [ 2676.535510] ip_generic_getfrag+0x173/0x270 [ 2676.536118] ? ip_frag_init+0x350/0x350 [ 2676.536696] ? lock_is_held_type+0xd7/0x130 [ 2676.537292] ? memset+0x20/0x50 [ 2676.537782] raw_getfrag+0x22d/0x290 [ 2676.538298] ? __alloc_skb+0x17b/0x300 [ 2676.538845] __ip_append_data+0x1d7f/0x3aa0 [ 2676.539454] ? raw_destroy+0x30/0x30 [ 2676.539987] ? perf_trace_preemptirq_template+0x274/0x420 [ 2676.540721] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2676.541413] ? lock_is_held_type+0xd7/0x130 [ 2676.542004] ? ipv4_mtu+0x28a/0x380 [ 2676.542526] ? raw_destroy+0x30/0x30 [ 2676.543036] ip_append_data+0x114/0x1a0 [ 2676.543594] raw_sendmsg+0xa97/0x2b80 [ 2676.544134] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2676.544876] ? __lock_acquire+0x164d/0x5e70 [ 2676.545479] ? raw_recvmsg+0x790/0x790 [ 2676.546011] ? __lock_acquire+0x164d/0x5e70 [ 2676.546613] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2676.547329] ? __might_fault+0xd1/0x170 [ 2676.547885] ? lock_downgrade+0x6d0/0x6d0 [ 2676.548492] ? selinux_socket_listen+0x2b0/0x2b0 [ 2676.549151] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2676.549811] ? raw_recvmsg+0x790/0x790 [ 2676.550347] inet_sendmsg+0x11d/0x140 [ 2676.550889] ? inet_send_prepare+0x4e0/0x4e0 [ 2676.551516] sock_sendmsg+0x13c/0x190 [ 2676.552047] ____sys_sendmsg+0x744/0x930 [ 2676.552623] ? kernel_sendmsg+0x50/0x50 [ 2676.553180] ? perf_mmap_fault+0x780/0x780 [ 2676.553784] ___sys_sendmsg+0x110/0x1b0 [ 2676.554317] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2676.554957] ? __fget_files+0x24e/0x450 [ 2676.555510] ? lock_downgrade+0x6d0/0x6d0 [ 2676.556093] ? lock_release+0x3b2/0x750 [ 2676.556673] ? ksys_write+0x214/0x250 [ 2676.557225] ? __fget_files+0x270/0x450 [ 2676.557794] ? __fget_light+0xe5/0x280 [ 2676.558352] __sys_sendmsg+0xf3/0x1c0 [ 2676.558886] ? __sys_sendmsg_sock+0x40/0x40 [ 2676.559501] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2676.560190] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2676.560914] do_syscall_64+0x3b/0x90 [ 2676.561431] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2676.562129] RIP: 0033:0x7fe6000ceb19 [ 2676.562637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2676.565013] RSP: 002b:00007fe5fd644188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2676.566015] RAX: ffffffffffffffda RBX: 00007fe6001e1f60 RCX: 00007fe6000ceb19 [ 2676.566960] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2676.567899] RBP: 00007fe5fd6441d0 R08: 0000000000000000 R09: 0000000000000000 [ 2676.568848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2676.569848] R13: 00007ffef9a5345f R14: 00007fe5fd644300 R15: 0000000000022000 [ 2676.570783] 03:57:39 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x60, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) [ 2676.595065] FAULT_INJECTION: forcing a failure. [ 2676.595065] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2676.596809] CPU: 0 PID: 12641 Comm: syz-executor.1 Not tainted 6.0.0-next-20221014 #1 [ 2676.597832] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2676.598874] Call Trace: [ 2676.599220] [ 2676.599530] dump_stack_lvl+0x8b/0xb3 [ 2676.600045] should_fail.cold+0x5/0xa [ 2676.600584] _copy_from_user+0x2a/0x170 [ 2676.601135] csum_and_copy_from_iter+0x626/0x1470 [ 2676.601797] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2676.602396] ? lock_release+0x3b2/0x750 [ 2676.602934] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2676.603597] ? mark_held_locks+0x9e/0xe0 [ 2676.604198] ip_generic_getfrag+0x173/0x270 [ 2676.604806] ? ip_frag_init+0x350/0x350 [ 2676.605352] ? lock_is_held_type+0xd7/0x130 [ 2676.605947] ? memset+0x20/0x50 [ 2676.606423] raw_getfrag+0x22d/0x290 [ 2676.606935] ? __alloc_skb+0x17b/0x300 [ 2676.607477] __ip_append_data+0x1d7f/0x3aa0 [ 2676.608083] ? raw_destroy+0x30/0x30 [ 2676.608604] ? perf_trace_preemptirq_template+0x274/0x420 [ 2676.609345] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2676.610036] ? lock_is_held_type+0xd7/0x130 [ 2676.610631] ? ipv4_mtu+0x28a/0x380 [ 2676.611153] ? raw_destroy+0x30/0x30 [ 2676.611657] ip_append_data+0x114/0x1a0 [ 2676.612212] raw_sendmsg+0xa97/0x2b80 [ 2676.612753] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2676.613460] ? __lock_acquire+0x164d/0x5e70 [ 2676.614068] ? raw_recvmsg+0x790/0x790 [ 2676.614592] ? __lock_acquire+0x164d/0x5e70 [ 2676.615210] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2676.615935] ? __might_fault+0xd1/0x170 [ 2676.616501] ? lock_downgrade+0x6d0/0x6d0 [ 2676.617100] ? selinux_socket_listen+0x2b0/0x2b0 [ 2676.617751] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2676.618410] ? raw_recvmsg+0x790/0x790 [ 2676.618960] inet_sendmsg+0x11d/0x140 [ 2676.619492] ? inet_send_prepare+0x4e0/0x4e0 [ 2676.620110] sock_sendmsg+0x13c/0x190 [ 2676.620647] ____sys_sendmsg+0x744/0x930 [ 2676.621208] ? kernel_sendmsg+0x50/0x50 [ 2676.621756] ? perf_mmap_fault+0x780/0x780 [ 2676.622356] ___sys_sendmsg+0x110/0x1b0 [ 2676.622912] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2676.623550] ? __fget_files+0x24e/0x450 [ 2676.624103] ? lock_downgrade+0x6d0/0x6d0 [ 2676.624688] ? lock_release+0x3b2/0x750 [ 2676.625234] ? ksys_write+0x214/0x250 [ 2676.625777] ? __fget_files+0x270/0x450 [ 2676.626336] ? __fget_light+0xe5/0x280 [ 2676.626880] __sys_sendmsg+0xf3/0x1c0 [ 2676.627406] ? __sys_sendmsg_sock+0x40/0x40 [ 2676.628016] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2676.628713] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2676.629416] do_syscall_64+0x3b/0x90 [ 2676.629912] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2676.630614] RIP: 0033:0x7fe315a89b19 [ 2676.631108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2676.633440] RSP: 002b:00007fe312fff188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2676.634405] RAX: ffffffffffffffda RBX: 00007fe315b9cf60 RCX: 00007fe315a89b19 [ 2676.635336] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2676.636255] RBP: 00007fe312fff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2676.637197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2676.638099] R13: 00007ffc523f877f R14: 00007fe312fff300 R15: 0000000000022000 [ 2676.639067] 03:57:53 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x1f4, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 03:57:53 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) [ 2690.516129] loop6: detected capacity change from 0 to 4 03:57:53 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100), 0x0, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 03:57:53 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 31) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:57:53 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 33) 03:57:53 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8", 0x2d, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() 03:57:53 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 31) 03:57:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000100000000000000", 0x54, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) [ 2690.539338] loop0: detected capacity change from 0 to 4 [ 2690.539984] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 03:57:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000100000000000000", 0x54, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="006e65d74591fd202655d5296c04c3d69fe822a7c4bd92567542878c83b4ef5127140a9f14aa72ecc01922520ac0334444cd41a1b3b73471dbf3064b11acfb0ed427a9ffcd9ff54eb279e399d348517a31057cdd24d4ee2ae83ccc654b4b0a3e09b3d30fee1fa11ed3001586de50ff78a08d04eb1a16479a57913b15969b1d46857999eadeb4488f69355c9c2b72894702cbaf3a77bfcee237ec4e7d2f449ccebe45a80081b67ea60dd3c392c952043b2dc6e7b6b242a414e0291a7bc6bfcbdfafc92eb8b50cfcb21688c4e636398f5c22bf6c6e4455867f0a63c2f2cb099a48910a3c6d7ac76da9647d969b5450c88e34710a2e720600000000000000f66a603371aa09a2000000000000"]) 03:57:53 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 32) [ 2690.659504] loop0: detected capacity change from 0 to 4 03:57:53 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 34) 03:57:53 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 32) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:57:53 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x300, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 03:57:53 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb72", 0x18, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 03:57:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000100000000000000", 0x54, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="006e65d74591fd202655d5296c04c3d69fe822a7c4bd92567542878c83b4ef5127140a9f14aa72ecc01922520ac0334444cd41a1b3b73471dbf3064b11acfb0ed427a9ffcd9ff54eb279e399d348517a31057cdd24d4ee2ae83ccc654b4b0a3e09b3d30fee1fa11ed3001586de50ff78a08d04eb1a16479a57913b15969b1d46857999eadeb4488f69355c9c2b72894702cbaf3a77bfcee237ec4e7d2f449ccebe45a80081b67ea60dd3c392c952043b2dc6e7b6b242a414e0291a7bc6bfcbdfafc92eb8b50cfcb21688c4e636398f5c22bf6c6e4455867f0a63c2f2cb099a48910a3c6d7ac76da9647d969b5450c88e34710a2e720600000000000000f66a603371aa09a2000000000000"]) 03:57:53 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 33) 03:57:53 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8", 0x2d, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() 03:57:53 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x3e8, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 03:57:53 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 35) 03:57:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) [ 2691.012169] No source specified [ 2691.029689] FAULT_INJECTION: forcing a failure. [ 2691.029689] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2691.030616] CPU: 0 PID: 12707 Comm: syz-executor.3 Not tainted 6.0.0-next-20221014 #1 [ 2691.031165] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2691.031755] Call Trace: [ 2691.031940] [ 2691.032106] dump_stack_lvl+0x8b/0xb3 [ 2691.032396] should_fail.cold+0x5/0xa [ 2691.032683] _copy_from_user+0x2a/0x170 [ 2691.032982] csum_and_copy_from_iter+0x626/0x1470 [ 2691.033332] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2691.033656] ? lock_release+0x3b2/0x750 [ 2691.033949] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2691.034310] ? mark_held_locks+0x9e/0xe0 [ 2691.034608] ip_generic_getfrag+0x173/0x270 [ 2691.034929] ? ip_frag_init+0x350/0x350 [ 2691.035207] ? lock_is_held_type+0xd7/0x130 [ 2691.035522] ? memset+0x20/0x50 [ 2691.035775] raw_getfrag+0x22d/0x290 [ 2691.036047] ? __alloc_skb+0x17b/0x300 [ 2691.036316] __ip_append_data+0x1d7f/0x3aa0 [ 2691.036640] ? raw_destroy+0x30/0x30 [ 2691.036916] ? perf_trace_preemptirq_template+0x274/0x420 [ 2691.037287] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2691.037628] ? lock_is_held_type+0xd7/0x130 [ 2691.037918] ? ipv4_mtu+0x28a/0x380 [ 2691.038177] ? raw_destroy+0x30/0x30 [ 2691.038437] ip_append_data+0x114/0x1a0 [ 2691.038713] raw_sendmsg+0xa97/0x2b80 [ 2691.038981] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2691.039333] ? __lock_acquire+0x164d/0x5e70 [ 2691.039630] ? raw_recvmsg+0x790/0x790 [ 2691.039895] ? __lock_acquire+0x164d/0x5e70 [ 2691.040208] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2691.040579] ? __might_fault+0xd1/0x170 [ 2691.040858] ? lock_downgrade+0x6d0/0x6d0 [ 2691.041147] ? selinux_socket_listen+0x2b0/0x2b0 [ 2691.041473] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2691.041797] ? raw_recvmsg+0x790/0x790 [ 2691.042062] inet_sendmsg+0x11d/0x140 [ 2691.042328] ? inet_send_prepare+0x4e0/0x4e0 [ 2691.042634] sock_sendmsg+0x13c/0x190 [ 2691.042898] ____sys_sendmsg+0x744/0x930 [ 2691.043181] ? kernel_sendmsg+0x50/0x50 [ 2691.043451] ? perf_mmap_fault+0x780/0x780 [ 2691.043757] ___sys_sendmsg+0x110/0x1b0 [ 2691.044038] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2691.044360] ? __fget_files+0x24e/0x450 [ 2691.044632] ? lock_downgrade+0x6d0/0x6d0 [ 2691.044930] ? lock_release+0x3b2/0x750 [ 2691.045205] ? ksys_write+0x214/0x250 [ 2691.045480] ? __fget_files+0x270/0x450 [ 2691.045761] ? __fget_light+0xe5/0x280 [ 2691.046046] __sys_sendmsg+0xf3/0x1c0 [ 2691.046321] ? __sys_sendmsg_sock+0x40/0x40 [ 2691.046648] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2691.047019] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2691.047391] do_syscall_64+0x3b/0x90 [ 2691.047643] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2691.048019] RIP: 0033:0x7f7fa6905b19 [ 2691.048267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2691.049525] RSP: 002b:00007f7fa3e7b188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2691.050054] RAX: ffffffffffffffda RBX: 00007f7fa6a18f60 RCX: 00007f7fa6905b19 [ 2691.050554] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2691.051045] RBP: 00007f7fa3e7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2691.051542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2691.052047] R13: 00007ffd9216c86f R14: 00007f7fa3e7b300 R15: 0000000000022000 [ 2691.052572] [ 2705.713500] No source specified 03:58:08 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 36) 03:58:08 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 33) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:58:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="006e65d74591fd202655d5296c04c3d69fe822a7c4bd92567542878c83b4ef5127140a9f14aa72ecc01922520ac0334444cd41a1b3b73471dbf3064b11acfb0ed427a9ffcd9ff54eb279e399d348517a31057cdd24d4ee2ae83ccc654b4b0a3e09b3d30fee1fa11ed3001586de50ff78a08d04eb1a16479a57913b15969b1d46857999eadeb4488f69355c9c2b72894702cbaf3a77bfcee237ec4e7d2f449ccebe45a80081b67ea60dd3c392c952043b2dc6e7b6b242a414e0291a7bc6bfcbdfafc92eb8b50cfcb21688c4e636398f5c22bf6c6e4455867f0a63c2f2cb099a48910a3c6d7ac76da9647d969b5450c88e34710a2e720600000000000000f66a603371aa09a2000000000000"]) 03:58:08 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb72", 0x18, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 03:58:08 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x600, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 03:58:08 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 34) 03:58:08 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b0", 0x2e, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() 03:58:08 executing program 6: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb3076", 0x2a, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() 03:58:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:58:08 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 37) [ 2705.826406] No source specified 03:58:08 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 35) 03:58:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:58:08 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 34) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:58:08 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0xe00, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) [ 2705.952690] FAULT_INJECTION: forcing a failure. [ 2705.952690] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2705.953700] CPU: 0 PID: 12740 Comm: syz-executor.1 Not tainted 6.0.0-next-20221014 #1 [ 2705.954219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2705.954752] Call Trace: [ 2705.954928] [ 2705.955086] dump_stack_lvl+0x8b/0xb3 [ 2705.955352] should_fail.cold+0x5/0xa [ 2705.955620] _copy_from_user+0x2a/0x170 [ 2705.955897] csum_and_copy_from_iter+0x626/0x1470 [ 2705.956235] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2705.956549] ? lock_release+0x3b2/0x750 [ 2705.956822] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2705.957171] ? mark_held_locks+0x9e/0xe0 [ 2705.957456] ip_generic_getfrag+0x173/0x270 [ 2705.957760] ? ip_frag_init+0x350/0x350 [ 2705.958042] ? lock_is_held_type+0xd7/0x130 [ 2705.958339] ? memset+0x20/0x50 [ 2705.958578] raw_getfrag+0x22d/0x290 [ 2705.958833] ? __alloc_skb+0x17b/0x300 [ 2705.959112] __ip_append_data+0x1d7f/0x3aa0 [ 2705.959409] ? raw_destroy+0x30/0x30 [ 2705.959663] ? perf_trace_preemptirq_template+0x274/0x420 [ 2705.960038] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2705.960369] ? lock_is_held_type+0xd7/0x130 [ 2705.960672] ? ipv4_mtu+0x28a/0x380 [ 2705.960929] ? raw_destroy+0x30/0x30 [ 2705.961182] ip_append_data+0x114/0x1a0 [ 2705.961468] raw_sendmsg+0xa97/0x2b80 [ 2705.961737] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2705.962090] ? __lock_acquire+0x164d/0x5e70 [ 2705.962387] ? raw_recvmsg+0x790/0x790 [ 2705.962648] ? __lock_acquire+0x164d/0x5e70 [ 2705.962954] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2705.963307] ? __might_fault+0xd1/0x170 [ 2705.963586] ? lock_downgrade+0x6d0/0x6d0 [ 2705.963881] ? selinux_socket_listen+0x2b0/0x2b0 [ 2705.964211] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2705.964541] ? raw_recvmsg+0x790/0x790 [ 2705.964803] inet_sendmsg+0x11d/0x140 [ 2705.965067] ? inet_send_prepare+0x4e0/0x4e0 [ 2705.965387] sock_sendmsg+0x13c/0x190 [ 2705.965659] ____sys_sendmsg+0x744/0x930 [ 2705.965936] ? kernel_sendmsg+0x50/0x50 [ 2705.966232] ? perf_mmap_fault+0x780/0x780 [ 2705.966535] ___sys_sendmsg+0x110/0x1b0 [ 2705.966826] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2705.967167] ? __fget_files+0x24e/0x450 [ 2705.967441] ? lock_downgrade+0x6d0/0x6d0 [ 2705.967744] ? lock_release+0x3b2/0x750 [ 2705.968031] ? ksys_write+0x214/0x250 [ 2705.968307] ? __fget_files+0x270/0x450 [ 2705.968612] ? __fget_light+0xe5/0x280 [ 2705.968896] __sys_sendmsg+0xf3/0x1c0 [ 2705.969156] ? __sys_sendmsg_sock+0x40/0x40 [ 2705.969475] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2705.969821] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2705.970195] do_syscall_64+0x3b/0x90 [ 2705.970448] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2705.970819] RIP: 0033:0x7fe315a89b19 [ 2705.971085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2705.972346] RSP: 002b:00007fe312fff188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2705.972890] RAX: ffffffffffffffda RBX: 00007fe315b9cf60 RCX: 00007fe315a89b19 [ 2705.973384] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2705.973886] RBP: 00007fe312fff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2705.974389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2705.974891] R13: 00007ffc523f877f R14: 00007fe312fff300 R15: 0000000000022000 [ 2705.975413] [ 2705.981883] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:58:08 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 38) 03:58:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:58:08 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 35) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:58:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 1) 03:58:22 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b0", 0x2e, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() 03:58:22 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 36) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:58:22 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x6000, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 03:58:22 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 39) 03:58:22 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 36) 03:58:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:58:22 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb72", 0x18, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() [ 2719.813450] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:58:22 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 37) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:58:36 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b0", 0x2e, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() 03:58:36 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216", 0x24, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 03:58:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:58:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 2) 03:58:36 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 40) 03:58:36 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 37) 03:58:36 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x6fb9, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 03:58:36 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 38) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) [ 2733.887520] loop6: detected capacity change from 0 to 4 [ 2733.900958] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2733.927419] loop0: detected capacity change from 0 to 4 [ 2733.936860] FAULT_INJECTION: forcing a failure. [ 2733.936860] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2733.937951] CPU: 1 PID: 12801 Comm: syz-executor.3 Not tainted 6.0.0-next-20221014 #1 [ 2733.938597] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2733.939299] Call Trace: [ 2733.939520] [ 2733.939713] dump_stack_lvl+0x8b/0xb3 [ 2733.940055] should_fail.cold+0x5/0xa [ 2733.940408] _copy_from_user+0x2a/0x170 [ 2733.940749] csum_and_copy_from_iter+0x626/0x1470 [ 2733.941180] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2733.941567] ? lock_release+0x3b2/0x750 [ 2733.941912] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2733.942341] ? mark_held_locks+0x9e/0xe0 [ 2733.942710] ip_generic_getfrag+0x173/0x270 [ 2733.943086] ? ip_frag_init+0x350/0x350 [ 2733.943439] ? lock_is_held_type+0xd7/0x130 [ 2733.943812] ? memset+0x20/0x50 [ 2733.944107] raw_getfrag+0x22d/0x290 [ 2733.944435] ? __alloc_skb+0x17b/0x300 [ 2733.944776] __ip_append_data+0x1d7f/0x3aa0 [ 2733.945166] ? raw_destroy+0x30/0x30 [ 2733.945502] ? perf_trace_preemptirq_template+0x274/0x420 [ 2733.945977] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2733.946415] ? lock_is_held_type+0xd7/0x130 [ 2733.946779] ? ipv4_mtu+0x28a/0x380 [ 2733.947105] ? raw_destroy+0x30/0x30 [ 2733.947426] ip_append_data+0x114/0x1a0 [ 2733.947782] raw_sendmsg+0xa97/0x2b80 [ 2733.948110] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2733.948565] ? __lock_acquire+0x164d/0x5e70 [ 2733.948964] ? raw_recvmsg+0x790/0x790 [ 2733.949308] ? __lock_acquire+0x164d/0x5e70 [ 2733.949691] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2733.950130] ? __might_fault+0xd1/0x170 [ 2733.950474] ? lock_downgrade+0x6d0/0x6d0 [ 2733.950843] ? selinux_socket_listen+0x2b0/0x2b0 [ 2733.951254] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2733.951668] ? raw_recvmsg+0x790/0x790 [ 2733.951993] inet_sendmsg+0x11d/0x140 [ 2733.952321] ? inet_send_prepare+0x4e0/0x4e0 [ 2733.952710] sock_sendmsg+0x13c/0x190 [ 2733.953049] ____sys_sendmsg+0x744/0x930 [ 2733.953398] ? kernel_sendmsg+0x50/0x50 [ 2733.953742] ? perf_mmap_fault+0x780/0x780 [ 2733.954125] ___sys_sendmsg+0x110/0x1b0 [ 2733.954475] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2733.954877] ? __fget_files+0x24e/0x450 [ 2733.955225] ? lock_downgrade+0x6d0/0x6d0 [ 2733.955583] ? lock_release+0x3b2/0x750 [ 2733.955925] ? ksys_write+0x214/0x250 [ 2733.956275] ? __fget_files+0x270/0x450 [ 2733.956634] ? __fget_light+0xe5/0x280 [ 2733.956996] __sys_sendmsg+0xf3/0x1c0 [ 2733.957334] ? __sys_sendmsg_sock+0x40/0x40 [ 2733.957733] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2733.958176] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2733.958618] do_syscall_64+0x3b/0x90 [ 2733.958943] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2733.959379] RIP: 0033:0x7f7fa6905b19 [ 2733.959691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2733.961206] RSP: 002b:00007f7fa3e7b188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2733.961854] RAX: ffffffffffffffda RBX: 00007f7fa6a18f60 RCX: 00007f7fa6905b19 [ 2733.962462] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2733.963065] RBP: 00007f7fa3e7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2733.963647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2733.964248] R13: 00007ffd9216c86f R14: 00007f7fa3e7b300 R15: 0000000000022000 [ 2733.964849] [ 2733.965724] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:58:36 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 39) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:58:36 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() 03:58:36 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 38) 03:58:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 3) 03:58:36 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 40) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:58:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:58:36 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 39) 03:58:36 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0xb96f, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) [ 2734.156876] FAULT_INJECTION: forcing a failure. [ 2734.156876] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2734.157850] CPU: 1 PID: 12815 Comm: syz-executor.4 Not tainted 6.0.0-next-20221014 #1 [ 2734.158533] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2734.159254] Call Trace: [ 2734.159488] [ 2734.159698] dump_stack_lvl+0x8b/0xb3 [ 2734.160055] should_fail.cold+0x5/0xa [ 2734.160424] _copy_from_user+0x2a/0x170 [ 2734.160794] csum_and_copy_from_iter+0x626/0x1470 [ 2734.161248] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2734.161638] ? lock_release+0x3b2/0x750 [ 2734.161995] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2734.162434] ? mark_held_locks+0x9e/0xe0 [ 2734.162806] ip_generic_getfrag+0x173/0x270 [ 2734.163200] ? ip_frag_init+0x350/0x350 [ 2734.163472] ? lock_is_held_type+0xd7/0x130 [ 2734.163844] ? memset+0x20/0x50 [ 2734.164147] raw_getfrag+0x22d/0x290 [ 2734.164480] ? __alloc_skb+0x17b/0x300 [ 2734.164826] __ip_append_data+0x1d7f/0x3aa0 [ 2734.165231] ? raw_destroy+0x30/0x30 [ 2734.165570] ? perf_trace_preemptirq_template+0x274/0x420 [ 2734.166049] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2734.166501] ? lock_is_held_type+0xd7/0x130 [ 2734.166879] ? ipv4_mtu+0x28a/0x380 [ 2734.167217] ? raw_destroy+0x30/0x30 [ 2734.167541] ip_append_data+0x114/0x1a0 [ 2734.167900] raw_sendmsg+0xa97/0x2b80 [ 2734.168244] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2734.168575] ? __lock_acquire+0x164d/0x5e70 [ 2734.168611] FAULT_INJECTION: forcing a failure. [ 2734.168611] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2734.168957] ? raw_recvmsg+0x790/0x790 [ 2734.170812] ? __lock_acquire+0x164d/0x5e70 [ 2734.171220] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2734.171678] ? __might_fault+0xd1/0x170 [ 2734.172031] ? lock_downgrade+0x6d0/0x6d0 [ 2734.172407] ? selinux_socket_listen+0x2b0/0x2b0 [ 2734.172826] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2734.173260] ? raw_recvmsg+0x790/0x790 [ 2734.173514] inet_sendmsg+0x11d/0x140 [ 2734.173848] ? inet_send_prepare+0x4e0/0x4e0 [ 2734.174252] sock_sendmsg+0x13c/0x190 [ 2734.174586] ____sys_sendmsg+0x744/0x930 [ 2734.174941] ? kernel_sendmsg+0x50/0x50 [ 2734.175297] ? perf_mmap_fault+0x780/0x780 [ 2734.175683] ___sys_sendmsg+0x110/0x1b0 [ 2734.176038] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2734.176450] ? __fget_files+0x24e/0x450 [ 2734.176799] ? lock_downgrade+0x6d0/0x6d0 [ 2734.177084] ? lock_release+0x3b2/0x750 [ 2734.177425] ? ksys_write+0x214/0x250 [ 2734.177779] ? __fget_files+0x270/0x450 [ 2734.178138] ? __fget_light+0xe5/0x280 [ 2734.178498] __sys_sendmsg+0xf3/0x1c0 [ 2734.178842] ? __sys_sendmsg_sock+0x40/0x40 [ 2734.179236] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2734.179689] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2734.180144] do_syscall_64+0x3b/0x90 [ 2734.180479] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2734.180810] RIP: 0033:0x7fe6000ceb19 [ 2734.181127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2734.182669] RSP: 002b:00007fe5fd644188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2734.183320] RAX: ffffffffffffffda RBX: 00007fe6001e1f60 RCX: 00007fe6000ceb19 [ 2734.183921] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2734.184531] RBP: 00007fe5fd6441d0 R08: 0000000000000000 R09: 0000000000000000 [ 2734.185147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2734.185761] R13: 00007ffef9a5345f R14: 00007fe5fd644300 R15: 0000000000022000 [ 2734.186388] [ 2734.186595] CPU: 0 PID: 12817 Comm: syz-executor.6 Not tainted 6.0.0-next-20221014 #1 [ 2734.187593] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2734.188603] Call Trace: [ 2734.188949] [ 2734.189248] dump_stack_lvl+0x8b/0xb3 [ 2734.189745] should_fail.cold+0x5/0xa [ 2734.190254] _copy_from_user+0x2a/0x170 [ 2734.190780] __do_sys_memfd_create+0x103/0x4e0 [ 2734.191373] do_syscall_64+0x3b/0x90 [ 2734.191855] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2734.192494] RIP: 0033:0x7fae97d4bb19 [ 2734.192976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2734.195121] RSP: 002b:00007fae952c0f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2734.196065] RAX: ffffffffffffffda RBX: 0000000020000580 RCX: 00007fae97d4bb19 [ 2734.196930] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00007fae97da50fb [ 2734.197808] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 2734.198690] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 2734.199539] R13: 0000000020000100 R14: 0000000000000800 R15: 0000000020000440 [ 2734.200421] 03:58:36 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() [ 2734.228835] loop0: detected capacity change from 0 to 4 [ 2734.234874] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2749.307881] loop0: detected capacity change from 0 to 4 [ 2749.321055] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:58:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 4) 03:58:51 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() 03:58:51 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 40) 03:58:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:58:51 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0xe803, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 03:58:51 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 41) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:58:51 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 41) 03:58:51 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216", 0x24, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 03:58:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="006e65d74591fd202655d5296c04c3d69fe822a7c4bd92567542878c83b4ef5127140a9f14aa72ecc01922520ac0334444cd41a1b3b73471dbf3064b11acfb0ed427a9ffcd9ff54eb279e399d348517a31057cdd24d4ee2ae83ccc654b4b0a3e09b3d30fee1fa11ed3001586de50ff78a08d04eb1a16479a57913b15969b1d46857999eadeb4488f69355c9c2b72894702cbaf3a77bfcee237ec4e7d2f449ccebe45a80081b67ea60dd3c392c952043b2dc6e7b6b242a414e0291a7bc6bfcbdfafc92eb8b50cfcb21688c4e636398f5c22bf6c6e4455867f0a63c2f2cb099a48910a3c6d7ac76da9647d969b5450c88e34710a2e720600000000000000f66a603371aa09a2000000000000"]) 03:58:51 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 42) [ 2749.425463] FAULT_INJECTION: forcing a failure. [ 2749.425463] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2749.427385] CPU: 1 PID: 12853 Comm: syz-executor.1 Not tainted 6.0.0-next-20221014 #1 [ 2749.428329] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2749.429286] Call Trace: [ 2749.429612] [ 2749.429903] dump_stack_lvl+0x8b/0xb3 [ 2749.430391] should_fail.cold+0x5/0xa [ 2749.430885] _copy_from_user+0x2a/0x170 [ 2749.431399] csum_and_copy_from_iter+0x626/0x1470 [ 2749.432013] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2749.432575] ? lock_release+0x3b2/0x750 [ 2749.433092] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2749.433721] ? mark_held_locks+0x9e/0xe0 [ 2749.434255] ip_generic_getfrag+0x173/0x270 [ 2749.434814] ? ip_frag_init+0x350/0x350 [ 2749.435319] ? lock_is_held_type+0xd7/0x130 [ 2749.435869] ? memset+0x20/0x50 [ 2749.436312] raw_getfrag+0x22d/0x290 [ 2749.436779] loop0: detected capacity change from 0 to 4 [ 2749.436785] ? __alloc_skb+0x17b/0x300 [ 2749.437692] __ip_append_data+0x1d7f/0x3aa0 [ 2749.438246] ? raw_destroy+0x30/0x30 [ 2749.438766] ? perf_trace_preemptirq_template+0x274/0x420 [ 2749.439454] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2749.440122] ? lock_is_held_type+0xd7/0x130 [ 2749.440655] ? ipv4_mtu+0x28a/0x380 [ 2749.441175] ? raw_destroy+0x30/0x30 [ 2749.441643] ip_append_data+0x114/0x1a0 [ 2749.442203] raw_sendmsg+0xa97/0x2b80 [ 2749.442749] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2749.443470] ? __lock_acquire+0x164d/0x5e70 [ 2749.444076] ? raw_recvmsg+0x790/0x790 [ 2749.444615] ? __lock_acquire+0x164d/0x5e70 [ 2749.445269] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2749.445991] ? __might_fault+0xd1/0x170 [ 2749.446559] ? lock_downgrade+0x6d0/0x6d0 [ 2749.447152] ? selinux_socket_listen+0x2b0/0x2b0 [ 2749.447801] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2749.448448] ? raw_recvmsg+0x790/0x790 [ 2749.449003] inet_sendmsg+0x11d/0x140 [ 2749.449509] ? inet_send_prepare+0x4e0/0x4e0 [ 2749.450120] sock_sendmsg+0x13c/0x190 [ 2749.450655] ____sys_sendmsg+0x744/0x930 [ 2749.451224] ? kernel_sendmsg+0x50/0x50 [ 2749.451774] ? perf_mmap_fault+0x780/0x780 [ 2749.452388] ___sys_sendmsg+0x110/0x1b0 [ 2749.452943] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2749.453578] ? __fget_files+0x24e/0x450 [ 2749.454125] ? lock_downgrade+0x6d0/0x6d0 [ 2749.454402] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2749.454707] ? lock_release+0x3b2/0x750 [ 2749.455614] ? ksys_write+0x214/0x250 [ 2749.456114] ? __fget_files+0x270/0x450 [ 2749.456679] ? __fget_light+0xe5/0x280 [ 2749.457196] __sys_sendmsg+0xf3/0x1c0 [ 2749.457722] ? __sys_sendmsg_sock+0x40/0x40 [ 2749.458285] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2749.458994] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2749.459713] do_syscall_64+0x3b/0x90 [ 2749.460242] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2749.460958] RIP: 0033:0x7fe315a89b19 [ 2749.461456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2749.463801] RSP: 002b:00007fe312fff188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2749.464796] RAX: ffffffffffffffda RBX: 00007fe315b9cf60 RCX: 00007fe315a89b19 [ 2749.465734] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2749.466670] RBP: 00007fe312fff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2749.467603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2749.468548] R13: 00007ffc523f877f R14: 00007fe312fff300 R15: 0000000000022000 [ 2749.469525] 03:58:52 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 42) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:58:52 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216", 0x24, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 03:58:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 5) 03:58:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:58:52 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0xf401, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 03:58:52 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 43) [ 2749.629768] loop6: detected capacity change from 0 to 4 03:58:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) [ 2749.647892] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2749.704775] loop0: detected capacity change from 0 to 4 [ 2749.713517] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:59:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 6) 03:59:05 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 44) [ 2763.188217] loop0: detected capacity change from 0 to 4 [ 2763.202926] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:59:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 43) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:59:05 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x3}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 03:59:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 41) 03:59:05 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb3076", 0x2a, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 03:59:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f00000000000000010000000100000000400000004000002000", 0x2a, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:59:05 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x810, 0xffffffffffffffff, 0x0) fork() 03:59:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 7) [ 2763.242054] loop6: detected capacity change from 0 to 4 [ 2763.256890] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 03:59:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 42) 03:59:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f00000000000000010000000100000000400000004000002000", 0x2a, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:59:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 44) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:59:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 8) 03:59:05 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x810, 0xffffffffffffffff, 0x0) fork() 03:59:05 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x3}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) [ 2763.390923] loop0: detected capacity change from 0 to 4 [ 2763.411657] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:59:05 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 45) 03:59:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 9) 03:59:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 43) [ 2763.484322] loop6: detected capacity change from 0 to 4 [ 2763.491519] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 03:59:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 44) 03:59:19 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 45) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:59:19 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x810, 0xffffffffffffffff, 0x0) fork() 03:59:19 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb3076", 0x2a, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 03:59:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f00000000000000010000000100000000400000004000002000", 0x2a, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="006e65d74591fd202655d5296c04c3d69fe822a7c4bd92567542878c83b4ef5127140a9f14aa72ecc01922520ac0334444cd41a1b3b73471dbf3064b11acfb0ed427a9ffcd9ff54eb279e399d348517a31057cdd24d4ee2ae83ccc654b4b0a3e09b3d30fee1fa11ed3001586de50ff78a08d04eb1a16479a57913b15969b1d46857999eadeb4488f69355c9c2b72894702cbaf3a77bfcee237ec4e7d2f449ccebe45a80081b67ea60dd3c392c952043b2dc6e7b6b242a414e0291a7bc6bfcbdfafc92eb8b50cfcb21688c4e636398f5c22bf6c6e4455867f0a63c2f2cb099a48910a3c6d7ac76da9647d969b5450c88e34710a2e720600000000000000f66a603371aa09a2000000000000"]) 03:59:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 10) 03:59:19 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0xf, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 03:59:19 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 46) [ 2777.363466] FAULT_INJECTION: forcing a failure. [ 2777.363466] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2777.364436] CPU: 1 PID: 12943 Comm: syz-executor.4 Not tainted 6.0.0-next-20221014 #1 [ 2777.364962] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2777.365520] Call Trace: [ 2777.365696] [ 2777.365855] dump_stack_lvl+0x8b/0xb3 [ 2777.366126] should_fail.cold+0x5/0xa [ 2777.366404] _copy_from_user+0x2a/0x170 [ 2777.366689] csum_and_copy_from_iter+0x626/0x1470 [ 2777.367030] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2777.367333] ? lock_release+0x3b2/0x750 [ 2777.367623] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2777.367959] ? mark_held_locks+0x9e/0xe0 [ 2777.368250] ip_generic_getfrag+0x173/0x270 [ 2777.368550] ? ip_frag_init+0x350/0x350 [ 2777.368836] ? lock_is_held_type+0xd7/0x130 [ 2777.369142] ? memset+0x20/0x50 [ 2777.369391] raw_getfrag+0x22d/0x290 [ 2777.369663] ? __alloc_skb+0x17b/0x300 [ 2777.369940] __ip_append_data+0x1d7f/0x3aa0 [ 2777.370243] ? raw_destroy+0x30/0x30 [ 2777.370511] ? perf_trace_preemptirq_template+0x274/0x420 [ 2777.370887] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2777.371236] ? lock_is_held_type+0xd7/0x130 [ 2777.371339] loop0: detected capacity change from 0 to 4 [ 2777.371530] ? ipv4_mtu+0x28a/0x380 [ 2777.372484] ? raw_destroy+0x30/0x30 [ 2777.372741] ip_append_data+0x114/0x1a0 [ 2777.373022] raw_sendmsg+0xa97/0x2b80 [ 2777.373290] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2777.373659] ? __lock_acquire+0x164d/0x5e70 [ 2777.373961] ? raw_recvmsg+0x790/0x790 [ 2777.374236] ? __lock_acquire+0x164d/0x5e70 [ 2777.374549] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2777.374907] ? __might_fault+0xd1/0x170 [ 2777.375187] ? lock_downgrade+0x6d0/0x6d0 [ 2777.375488] ? selinux_socket_listen+0x2b0/0x2b0 [ 2777.375816] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2777.376145] ? raw_recvmsg+0x790/0x790 [ 2777.376419] inet_sendmsg+0x11d/0x140 [ 2777.376688] ? inet_send_prepare+0x4e0/0x4e0 [ 2777.376999] sock_sendmsg+0x13c/0x190 [ 2777.377270] ____sys_sendmsg+0x744/0x930 [ 2777.377577] ? kernel_sendmsg+0x50/0x50 [ 2777.377854] ? perf_mmap_fault+0x780/0x780 [ 2777.378178] ___sys_sendmsg+0x110/0x1b0 [ 2777.378456] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2777.378795] ? __fget_files+0x24e/0x450 [ 2777.379071] ? lock_downgrade+0x6d0/0x6d0 [ 2777.379386] ? lock_release+0x3b2/0x750 [ 2777.379664] ? ksys_write+0x214/0x250 [ 2777.379961] ? __fget_files+0x270/0x450 [ 2777.380246] ? __fget_light+0xe5/0x280 [ 2777.380546] __sys_sendmsg+0xf3/0x1c0 [ 2777.380810] ? __sys_sendmsg_sock+0x40/0x40 [ 2777.381140] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2777.381504] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2777.381881] do_syscall_64+0x3b/0x90 [ 2777.382161] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2777.382545] RIP: 0033:0x7fe6000ceb19 [ 2777.382806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2777.384011] RSP: 002b:00007fe5fd644188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2777.384561] RAX: ffffffffffffffda RBX: 00007fe6001e1f60 RCX: 00007fe6000ceb19 [ 2777.385037] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2777.385569] RBP: 00007fe5fd6441d0 R08: 0000000000000000 R09: 0000000000000000 [ 2777.386077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2777.386593] R13: 00007ffef9a5345f R14: 00007fe5fd644300 R15: 0000000000022000 [ 2777.387119] [ 2777.401510] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:59:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 11) 03:59:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 45) [ 2777.452883] loop6: detected capacity change from 0 to 4 [ 2777.467148] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2777.511483] FAULT_INJECTION: forcing a failure. [ 2777.511483] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2777.512414] CPU: 1 PID: 12957 Comm: syz-executor.1 Not tainted 6.0.0-next-20221014 #1 [ 2777.512938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2777.513492] Call Trace: [ 2777.513670] [ 2777.513834] dump_stack_lvl+0x8b/0xb3 [ 2777.514110] should_fail.cold+0x5/0xa [ 2777.514380] _copy_from_user+0x2a/0x170 [ 2777.514664] csum_and_copy_from_iter+0x626/0x1470 [ 2777.515008] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2777.515315] ? lock_release+0x3b2/0x750 [ 2777.515598] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2777.515939] ? mark_held_locks+0x9e/0xe0 [ 2777.516230] ip_generic_getfrag+0x173/0x270 [ 2777.516540] ? ip_frag_init+0x350/0x350 [ 2777.516821] ? lock_is_held_type+0xd7/0x130 [ 2777.517134] ? memset+0x20/0x50 [ 2777.517388] raw_getfrag+0x22d/0x290 [ 2777.517657] ? __alloc_skb+0x17b/0x300 [ 2777.517935] __ip_append_data+0x1d7f/0x3aa0 [ 2777.518245] ? raw_destroy+0x30/0x30 [ 2777.518514] ? perf_trace_preemptirq_template+0x274/0x420 [ 2777.518892] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2777.519248] ? lock_is_held_type+0xd7/0x130 [ 2777.519543] ? ipv4_mtu+0x28a/0x380 [ 2777.519804] ? raw_destroy+0x30/0x30 [ 2777.520064] ip_append_data+0x114/0x1a0 [ 2777.520352] raw_sendmsg+0xa97/0x2b80 [ 2777.520621] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2777.520986] ? __lock_acquire+0x164d/0x5e70 [ 2777.521290] ? raw_recvmsg+0x790/0x790 [ 2777.521598] ? __lock_acquire+0x164d/0x5e70 [ 2777.521930] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2777.522316] ? __might_fault+0xd1/0x170 [ 2777.522620] ? lock_downgrade+0x6d0/0x6d0 [ 2777.522939] ? selinux_socket_listen+0x2b0/0x2b0 [ 2777.523304] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2777.523663] ? raw_recvmsg+0x790/0x790 [ 2777.523951] inet_sendmsg+0x11d/0x140 [ 2777.524242] ? inet_send_prepare+0x4e0/0x4e0 [ 2777.524584] sock_sendmsg+0x13c/0x190 [ 2777.524848] ____sys_sendmsg+0x744/0x930 [ 2777.525153] ? kernel_sendmsg+0x50/0x50 [ 2777.525443] ? perf_mmap_fault+0x780/0x780 [ 2777.525770] ___sys_sendmsg+0x110/0x1b0 [ 2777.526067] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2777.526413] ? __fget_files+0x24e/0x450 [ 2777.526692] ? lock_downgrade+0x6d0/0x6d0 [ 2777.527006] ? lock_release+0x3b2/0x750 [ 2777.527296] ? ksys_write+0x214/0x250 [ 2777.527595] ? __fget_files+0x270/0x450 [ 2777.527880] ? __fget_light+0xe5/0x280 [ 2777.528183] __sys_sendmsg+0xf3/0x1c0 [ 2777.528450] ? __sys_sendmsg_sock+0x40/0x40 [ 2777.528777] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2777.529130] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2777.529540] do_syscall_64+0x3b/0x90 [ 2777.529810] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2777.530201] RIP: 0033:0x7fe315a89b19 [ 2777.530473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2777.531786] RSP: 002b:00007fe312fff188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2777.532344] RAX: ffffffffffffffda RBX: 00007fe315b9cf60 RCX: 00007fe315a89b19 [ 2777.532858] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2777.533369] RBP: 00007fe312fff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2777.533888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2777.534398] R13: 00007ffc523f877f R14: 00007fe312fff300 R15: 0000000000022000 [ 2777.534926] 03:59:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef0100010000", 0x3f, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:59:20 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 47) 03:59:20 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 46) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:59:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 12) 03:59:20 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0xe7bc8f7b, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) [ 2777.620320] loop0: detected capacity change from 0 to 4 [ 2777.629626] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) 03:59:20 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb3076", 0x2a, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 03:59:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 13) [ 2777.726731] loop6: detected capacity change from 0 to 4 [ 2777.735685] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 03:59:36 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8", 0x2d, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 03:59:36 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 46) 03:59:36 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x10, 0xffffffffffffffff, 0x0) fork() 03:59:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 14) 03:59:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef0100010000", 0x3f, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:59:36 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 47) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:59:36 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0x2}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 03:59:36 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 48) [ 2794.145464] loop6: detected capacity change from 0 to 4 03:59:36 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 47) [ 2794.164105] loop0: detected capacity change from 0 to 4 [ 2794.167263] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 2794.181788] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) 03:59:36 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0x39404b2c}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 03:59:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 15) 03:59:36 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 49) 03:59:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef0100010000", 0x3f, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:59:36 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 48) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) [ 2794.312094] FAULT_INJECTION: forcing a failure. [ 2794.312094] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2794.313094] CPU: 0 PID: 13008 Comm: syz-executor.6 Not tainted 6.0.0-next-20221014 #1 [ 2794.313609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2794.314157] Call Trace: [ 2794.314337] [ 2794.314496] dump_stack_lvl+0x8b/0xb3 [ 2794.314764] should_fail.cold+0x5/0xa [ 2794.315033] copyin+0x19/0x120 [ 2794.315263] copy_page_from_iter_atomic+0x249/0x1290 [ 2794.315606] ? mark_held_locks+0x9e/0xe0 [ 2794.315892] ? hash_and_copy_to_iter+0x210/0x210 [ 2794.316213] ? shmem_write_begin+0x15b/0x370 [ 2794.316519] ? shmem_file_read_iter+0xae0/0xae0 [ 2794.316853] generic_perform_write+0x2cb/0x580 [ 2794.317178] ? generic_file_readonly_mmap+0x1b0/0x1b0 [ 2794.317511] ? new_inode+0x1e0/0x1e0 [ 2794.317773] ? generic_write_checks+0x2bc/0x400 [ 2794.318102] __generic_file_write_iter+0x2da/0x480 [ 2794.318440] generic_file_write_iter+0xe3/0x350 [ 2794.318757] vfs_write+0x9c3/0xd90 [ 2794.319010] ? kernel_write+0x630/0x630 [ 2794.319305] __x64_sys_pwrite64+0x1fb/0x260 [ 2794.319607] ? vfs_write+0xd90/0xd90 [ 2794.319868] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2794.320215] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2794.320549] do_syscall_64+0x3b/0x90 [ 2794.320810] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2794.321158] RIP: 0033:0x7fae97cfeab7 [ 2794.321399] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2794.322578] RSP: 002b:00007fae952c0f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2794.323069] RAX: ffffffffffffffda RBX: 00007fae97d95970 RCX: 00007fae97cfeab7 [ 2794.323535] RDX: 000000000000005d RSI: 0000000020010000 RDI: 0000000000000004 [ 2794.323997] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 2794.324461] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 2794.324923] R13: 0000000000000004 R14: 0000000020000580 R15: 0000000000000000 [ 2794.325402] [ 2794.374616] loop6: detected capacity change from 0 to 4 03:59:36 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0x7ffff000}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) [ 2794.387689] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 03:59:36 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 50) [ 2794.424732] loop0: detected capacity change from 0 to 4 [ 2794.433355] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) 03:59:51 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xfffffdef}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 03:59:51 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 48) 03:59:51 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x10, 0xffffffffffffffff, 0x0) fork() 03:59:51 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 49) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 03:59:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 16) 03:59:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000", 0x4a, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:59:51 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8", 0x2d, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 03:59:51 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 51) [ 2809.110917] loop0: detected capacity change from 0 to 4 [ 2809.116408] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) 03:59:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000", 0x4a, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 03:59:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 17) 03:59:51 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 52) [ 2809.235256] loop0: detected capacity change from 0 to 4 [ 2809.247541] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) 03:59:51 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x10, 0xffffffffffffffff, 0x0) fork() 03:59:51 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8", 0x2d, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() [ 2809.367065] loop6: detected capacity change from 0 to 4 [ 2809.378101] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2822.846654] FAULT_INJECTION: forcing a failure. [ 2822.846654] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2822.847523] CPU: 0 PID: 13069 Comm: syz-executor.6 Not tainted 6.0.0-next-20221014 #1 [ 2822.848039] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2822.848585] Call Trace: [ 2822.848768] [ 2822.848929] dump_stack_lvl+0x8b/0xb3 [ 2822.849196] should_fail.cold+0x5/0xa [ 2822.849479] strncpy_from_user+0x34/0x3e0 [ 2822.849773] getname_flags.part.0+0x95/0x4f0 [ 2822.850089] ? vfs_write+0x48e/0xd90 [ 2822.850362] getname+0x8e/0xd0 [ 2822.850588] do_sys_openat2+0xf9/0x4c0 [ 2822.850859] ? build_open_flags+0x6f0/0x6f0 [ 2822.851160] ? syscall_enter_from_user_mode+0x18/0x50 [ 2822.851515] ? perf_trace_preemptirq_template+0xa2/0x420 [ 2822.851887] __x64_sys_openat+0x13f/0x1f0 [ 2822.852169] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2822.852503] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2822.852853] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2822.853205] do_syscall_64+0x3b/0x90 [ 2822.853462] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2822.853812] RIP: 0033:0x7fae97cfea04 [ 2822.854075] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2822.855250] RSP: 002b:00007fae952c0ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2822.855749] RAX: ffffffffffffffda RBX: 00007fae97d95970 RCX: 00007fae97cfea04 [ 2822.856220] RDX: 0000000000000002 RSI: 00007fae952c1000 RDI: 00000000ffffff9c [ 2822.856708] RBP: 00007fae952c1000 R08: 0000000000000000 R09: ffffffffffffffff [ 2822.857443] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2822.857944] R13: 0000000000000004 R14: 0000000020000598 R15: 0000000000000001 [ 2822.858484] 04:00:05 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0x7ffffffff000}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:00:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000", 0x4a, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="006e65d74591fd202655d5296c04c3d69fe822a7c4bd92567542878c83b4ef5127140a9f14aa72ecc01922520ac0334444cd41a1b3b73471dbf3064b11acfb0ed427a9ffcd9ff54eb279e399d348517a31057cdd24d4ee2ae83ccc654b4b0a3e09b3d30fee1fa11ed3001586de50ff78a08d04eb1a16479a57913b15969b1d46857999eadeb4488f69355c9c2b72894702cbaf3a77bfcee237ec4e7d2f449ccebe45a80081b67ea60dd3c392c952043b2dc6e7b6b242a414e0291a7bc6bfcbdfafc92eb8b50cfcb21688c4e636398f5c22bf6c6e4455867f0a63c2f2cb099a48910a3c6d7ac76da9647d969b5450c88e34710a2e720600000000000000f66a603371aa09a2000000000000"]) 04:00:05 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b0", 0x2e, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:00:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 50) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:00:05 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 53) 04:00:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 18) [ 2822.895568] loop0: detected capacity change from 0 to 4 [ 2822.908002] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2822.924541] FAULT_INJECTION: forcing a failure. [ 2822.924541] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2822.926370] CPU: 1 PID: 13071 Comm: syz-executor.4 Not tainted 6.0.0-next-20221014 #1 [ 2822.927376] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2822.928415] Call Trace: [ 2822.928756] [ 2822.929067] dump_stack_lvl+0x8b/0xb3 [ 2822.929582] should_fail.cold+0x5/0xa [ 2822.930111] _copy_from_user+0x2a/0x170 [ 2822.930663] csum_and_copy_from_iter+0x626/0x1470 [ 2822.931326] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2822.931916] ? lock_release+0x3b2/0x750 [ 2822.932455] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2822.933110] ? mark_held_locks+0x9e/0xe0 [ 2822.933674] ip_generic_getfrag+0x173/0x270 [ 2822.934278] ? ip_frag_init+0x350/0x350 [ 2822.934826] ? lock_is_held_type+0xd7/0x130 [ 2822.935433] ? memset+0x20/0x50 [ 2822.935911] raw_getfrag+0x22d/0x290 [ 2822.936415] ? __alloc_skb+0x17b/0x300 [ 2822.936945] __ip_append_data+0x1d7f/0x3aa0 [ 2822.937546] ? raw_destroy+0x30/0x30 [ 2822.938082] ? perf_trace_preemptirq_template+0x274/0x420 [ 2822.938824] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2822.939498] ? lock_is_held_type+0xd7/0x130 [ 2822.940080] ? ipv4_mtu+0x28a/0x380 [ 2822.940584] ? raw_destroy+0x30/0x30 [ 2822.941081] ip_append_data+0x114/0x1a0 [ 2822.941635] raw_sendmsg+0xa97/0x2b80 [ 2822.942163] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2822.942866] ? __lock_acquire+0x164d/0x5e70 [ 2822.943455] ? raw_recvmsg+0x790/0x790 [ 2822.943973] ? __lock_acquire+0x164d/0x5e70 [ 2822.944587] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2822.945295] ? __might_fault+0xd1/0x170 [ 2822.945846] ? lock_downgrade+0x6d0/0x6d0 [ 2822.946443] ? selinux_socket_listen+0x2b0/0x2b0 [ 2822.947094] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2822.947735] ? raw_recvmsg+0x790/0x790 [ 2822.948271] inet_sendmsg+0x11d/0x140 [ 2822.948797] ? inet_send_prepare+0x4e0/0x4e0 [ 2822.949409] sock_sendmsg+0x13c/0x190 [ 2822.949906] ____sys_sendmsg+0x744/0x930 [ 2822.950480] ? kernel_sendmsg+0x50/0x50 [ 2822.951024] ? perf_mmap_fault+0x780/0x780 [ 2822.951623] ___sys_sendmsg+0x110/0x1b0 [ 2822.952170] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2822.952832] ? __fget_files+0x24e/0x450 [ 2822.953378] ? lock_downgrade+0x6d0/0x6d0 [ 2822.953953] ? lock_release+0x3b2/0x750 [ 2822.954493] ? ksys_write+0x214/0x250 [ 2822.955044] ? __fget_files+0x270/0x450 [ 2822.955607] ? __fget_light+0xe5/0x280 [ 2822.956155] __sys_sendmsg+0xf3/0x1c0 [ 2822.956673] ? __sys_sendmsg_sock+0x40/0x40 [ 2822.957283] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2822.958000] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2822.958666] do_syscall_64+0x3b/0x90 [ 2822.959187] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2822.959867] RIP: 0033:0x7fe6000ceb19 [ 2822.960352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2822.962655] RSP: 002b:00007fe5fd644188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2822.963619] RAX: ffffffffffffffda RBX: 00007fe6001e1f60 RCX: 00007fe6000ceb19 [ 2822.964527] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2822.965431] RBP: 00007fe5fd6441d0 R08: 0000000000000000 R09: 0000000000000000 [ 2822.966355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2822.967260] R13: 00007ffef9a5345f R14: 00007fe5fd644300 R15: 0000000000022000 [ 2822.968214] 04:00:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 49) 04:00:05 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 1) 04:00:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 50) 04:00:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 19) 04:00:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 04:00:05 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 2) [ 2823.006420] FAULT_INJECTION: forcing a failure. [ 2823.006420] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2823.007349] CPU: 0 PID: 13086 Comm: syz-executor.1 Not tainted 6.0.0-next-20221014 #1 [ 2823.007869] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2823.008416] Call Trace: [ 2823.008597] [ 2823.008757] dump_stack_lvl+0x8b/0xb3 [ 2823.009033] should_fail.cold+0x5/0xa [ 2823.009308] _copy_from_user+0x2a/0x170 [ 2823.009594] csum_and_copy_from_iter+0x626/0x1470 [ 2823.009935] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2823.010250] ? lock_release+0x3b2/0x750 [ 2823.010526] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2823.010868] ? mark_held_locks+0x9e/0xe0 [ 2823.011162] ip_generic_getfrag+0x173/0x270 [ 2823.011476] ? ip_frag_init+0x350/0x350 [ 2823.011755] ? lock_is_held_type+0xd7/0x130 [ 2823.012060] ? memset+0x20/0x50 [ 2823.012308] raw_getfrag+0x22d/0x290 [ 2823.012568] ? __alloc_skb+0x17b/0x300 [ 2823.012847] __ip_append_data+0x1d7f/0x3aa0 [ 2823.013155] ? raw_destroy+0x30/0x30 [ 2823.013425] ? perf_trace_preemptirq_template+0x274/0x420 [ 2823.013797] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2823.014152] ? lock_is_held_type+0xd7/0x130 [ 2823.014451] ? ipv4_mtu+0x28a/0x380 [ 2823.014714] ? raw_destroy+0x30/0x30 [ 2823.014974] ip_append_data+0x114/0x1a0 [ 2823.015261] raw_sendmsg+0xa97/0x2b80 [ 2823.015537] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2823.015899] ? __lock_acquire+0x164d/0x5e70 [ 2823.016197] ? raw_recvmsg+0x790/0x790 [ 2823.016470] ? __lock_acquire+0x164d/0x5e70 [ 2823.016783] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2823.017142] ? __might_fault+0xd1/0x170 [ 2823.017420] ? lock_downgrade+0x6d0/0x6d0 [ 2823.017714] ? selinux_socket_listen+0x2b0/0x2b0 [ 2823.018069] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2823.018403] ? raw_recvmsg+0x790/0x790 [ 2823.018673] inet_sendmsg+0x11d/0x140 [ 2823.018950] ? inet_send_prepare+0x4e0/0x4e0 [ 2823.019263] sock_sendmsg+0x13c/0x190 [ 2823.019535] ____sys_sendmsg+0x744/0x930 [ 2823.019815] ? kernel_sendmsg+0x50/0x50 [ 2823.020101] ? perf_mmap_fault+0x780/0x780 [ 2823.020415] ___sys_sendmsg+0x110/0x1b0 [ 2823.020693] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2823.021011] ? __fget_files+0x24e/0x450 [ 2823.021298] ? lock_downgrade+0x6d0/0x6d0 [ 2823.021591] ? lock_release+0x3b2/0x750 [ 2823.021863] ? ksys_write+0x214/0x250 [ 2823.022146] ? __fget_files+0x270/0x450 [ 2823.022428] ? __fget_light+0xe5/0x280 [ 2823.022707] __sys_sendmsg+0xf3/0x1c0 [ 2823.022973] ? __sys_sendmsg_sock+0x40/0x40 [ 2823.023283] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2823.023641] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2823.023994] do_syscall_64+0x3b/0x90 [ 2823.024259] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2823.024607] RIP: 0033:0x7fe315a89b19 [ 2823.024866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2823.026053] RSP: 002b:00007fe312fff188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2823.026554] RAX: ffffffffffffffda RBX: 00007fe315b9cf60 RCX: 00007fe315a89b19 [ 2823.027025] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2823.027497] RBP: 00007fe312fff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2823.028016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2823.028515] R13: 00007ffc523f877f R14: 00007fe312fff300 R15: 0000000000022000 [ 2823.029025] 04:00:05 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x2, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:00:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 20) [ 2823.075750] loop0: detected capacity change from 0 to 4 [ 2823.087172] EXT4-fs (loop0): invalid first ino: 0 04:00:05 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 54) [ 2823.145549] loop6: detected capacity change from 0 to 4 [ 2823.164470] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 04:00:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 51) 04:00:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000", 0x4a, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 04:00:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 51) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:00:05 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b0", 0x2e, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:00:05 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x3, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) [ 2823.272983] FAULT_INJECTION: forcing a failure. [ 2823.272983] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2823.273997] CPU: 0 PID: 13105 Comm: syz-executor.1 Not tainted 6.0.0-next-20221014 #1 [ 2823.274529] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2823.275067] Call Trace: [ 2823.275249] [ 2823.275414] dump_stack_lvl+0x8b/0xb3 [ 2823.275686] should_fail.cold+0x5/0xa [ 2823.275956] _copy_from_user+0x2a/0x170 [ 2823.276249] csum_and_copy_from_iter+0x626/0x1470 [ 2823.276590] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2823.276899] ? lock_release+0x3b2/0x750 [ 2823.277180] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2823.277522] ? mark_held_locks+0x9e/0xe0 [ 2823.277818] ip_generic_getfrag+0x173/0x270 [ 2823.278138] ? ip_frag_init+0x350/0x350 [ 2823.278421] ? lock_is_held_type+0xd7/0x130 [ 2823.278723] ? memset+0x20/0x50 [ 2823.278960] raw_getfrag+0x22d/0x290 [ 2823.279229] ? __alloc_skb+0x17b/0x300 [ 2823.279495] __ip_append_data+0x1d7f/0x3aa0 [ 2823.279798] ? raw_destroy+0x30/0x30 [ 2823.280066] ? perf_trace_preemptirq_template+0x274/0x420 [ 2823.280442] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2823.280788] ? lock_is_held_type+0xd7/0x130 [ 2823.281078] ? ipv4_mtu+0x28a/0x380 [ 2823.281339] ? raw_destroy+0x30/0x30 [ 2823.281595] ip_append_data+0x114/0x1a0 [ 2823.281877] raw_sendmsg+0xa97/0x2b80 [ 2823.282147] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2823.282531] ? __lock_acquire+0x164d/0x5e70 [ 2823.282832] ? raw_recvmsg+0x790/0x790 [ 2823.283112] ? __lock_acquire+0x164d/0x5e70 [ 2823.283426] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2823.283798] ? __might_fault+0xd1/0x170 [ 2823.284077] ? lock_downgrade+0x6d0/0x6d0 [ 2823.284395] ? selinux_socket_listen+0x2b0/0x2b0 [ 2823.284726] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2823.285073] ? raw_recvmsg+0x790/0x790 [ 2823.285343] inet_sendmsg+0x11d/0x140 [ 2823.285627] ? inet_send_prepare+0x4e0/0x4e0 [ 2823.285934] sock_sendmsg+0x13c/0x190 [ 2823.286223] ____sys_sendmsg+0x744/0x930 [ 2823.286522] ? kernel_sendmsg+0x50/0x50 [ 2823.286798] ? perf_mmap_fault+0x780/0x780 [ 2823.287116] ___sys_sendmsg+0x110/0x1b0 [ 2823.287409] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2823.287741] ? __fget_files+0x24e/0x450 [ 2823.288018] ? lock_downgrade+0x6d0/0x6d0 [ 2823.288327] ? lock_release+0x3b2/0x750 [ 2823.288617] ? ksys_write+0x214/0x250 [ 2823.288911] ? __fget_files+0x270/0x450 [ 2823.289193] ? __fget_light+0xe5/0x280 [ 2823.289487] __sys_sendmsg+0xf3/0x1c0 [ 2823.289748] ? __sys_sendmsg_sock+0x40/0x40 [ 2823.290085] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2823.290460] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2823.290834] do_syscall_64+0x3b/0x90 [ 2823.291099] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2823.291468] RIP: 0033:0x7fe315a89b19 [ 2823.291726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2823.292976] RSP: 002b:00007fe312fff188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2823.293501] RAX: ffffffffffffffda RBX: 00007fe315b9cf60 RCX: 00007fe315a89b19 [ 2823.293994] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2823.294482] RBP: 00007fe312fff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2823.294969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2823.295457] R13: 00007ffc523f877f R14: 00007fe312fff300 R15: 0000000000022000 [ 2823.295968] 04:00:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 21) [ 2823.344279] loop0: detected capacity change from 0 to 4 04:00:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 52) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) [ 2823.367849] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) 04:00:05 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x5, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:00:05 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 55) [ 2823.404144] FAULT_INJECTION: forcing a failure. [ 2823.404144] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2823.405558] CPU: 1 PID: 13115 Comm: syz-executor.6 Not tainted 6.0.0-next-20221014 #1 [ 2823.406455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2823.407379] Call Trace: [ 2823.407688] [ 2823.407964] dump_stack_lvl+0x8b/0xb3 [ 2823.408429] should_fail.cold+0x5/0xa [ 2823.409013] strncpy_from_user+0x34/0x3e0 [ 2823.409624] getname_flags.part.0+0x95/0x4f0 [ 2823.410271] ? vfs_write+0x48e/0xd90 [ 2823.410840] getname+0x8e/0xd0 [ 2823.411323] do_sys_openat2+0xf9/0x4c0 [ 2823.411909] ? build_open_flags+0x6f0/0x6f0 [ 2823.412545] ? syscall_enter_from_user_mode+0x18/0x50 [ 2823.413286] ? perf_trace_preemptirq_template+0xa2/0x420 [ 2823.414109] __x64_sys_openat+0x13f/0x1f0 [ 2823.414738] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2823.415450] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2823.416196] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2823.416958] do_syscall_64+0x3b/0x90 [ 2823.417506] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2823.418269] RIP: 0033:0x7fae97cfea04 [ 2823.418803] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2823.421323] RSP: 002b:00007fae952c0ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2823.422413] RAX: ffffffffffffffda RBX: 00007fae97d95970 RCX: 00007fae97cfea04 [ 2823.423422] RDX: 0000000000000002 RSI: 00007fae952c1000 RDI: 00000000ffffff9c [ 2823.424434] RBP: 00007fae952c1000 R08: 0000000000000000 R09: ffffffffffffffff [ 2823.425399] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2823.426309] R13: 0000000000000004 R14: 0000000020000598 R15: 0000000000000001 [ 2823.427239] 04:00:06 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 52) 04:00:06 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 53) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:00:06 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x8, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:00:19 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b0", 0x2e, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:00:19 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 3) 04:00:19 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x9, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:00:19 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 56) 04:00:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000", 0x4a, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 04:00:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 53) 04:00:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 22) 04:00:19 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 54) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) [ 2836.732404] loop6: detected capacity change from 0 to 4 04:00:19 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 4) [ 2836.743249] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2836.773934] loop0: detected capacity change from 0 to 4 [ 2836.785025] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) 04:00:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 23) 04:00:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 54) 04:00:19 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 57) [ 2836.877115] loop6: detected capacity change from 0 to 4 04:00:19 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 5) [ 2836.889499] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 04:00:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000", 0x4a, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 04:00:19 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x11, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:00:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 24) [ 2837.021922] loop6: detected capacity change from 0 to 4 [ 2837.031426] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2837.033950] loop0: detected capacity change from 0 to 4 [ 2837.045634] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2853.732827] FAULT_INJECTION: forcing a failure. [ 2853.732827] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2853.733897] CPU: 0 PID: 13186 Comm: syz-executor.4 Not tainted 6.0.0-next-20221014 #1 [ 2853.734441] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2853.735198] Call Trace: [ 2853.735698] [ 2853.736067] dump_stack_lvl+0x8b/0xb3 [ 2853.736682] should_fail.cold+0x5/0xa [ 2853.737303] _copy_from_user+0x2a/0x170 [ 2853.737944] csum_and_copy_from_iter+0x626/0x1470 [ 2853.738758] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2853.739487] ? lock_release+0x3b2/0x750 [ 2853.740143] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2853.740938] ? mark_held_locks+0x9e/0xe0 [ 2853.741608] ip_generic_getfrag+0x173/0x270 [ 2853.742315] ? ip_frag_init+0x350/0x350 [ 2853.742947] ? lock_is_held_type+0xd7/0x130 [ 2853.743647] ? memset+0x20/0x50 [ 2853.744212] raw_getfrag+0x22d/0x290 [ 2853.744807] ? __alloc_skb+0x17b/0x300 [ 2853.745447] __ip_append_data+0x1d7f/0x3aa0 [ 2853.746164] ? raw_destroy+0x30/0x30 [ 2853.746777] ? perf_trace_preemptirq_template+0x274/0x420 [ 2853.747638] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2853.748421] ? lock_is_held_type+0xd7/0x130 [ 2853.749103] ? ipv4_mtu+0x28a/0x380 [ 2853.749698] ? raw_destroy+0x30/0x30 [ 2853.750276] ip_append_data+0x114/0x1a0 [ 2853.750920] raw_sendmsg+0xa97/0x2b80 [ 2853.751485] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2853.752242] ? __lock_acquire+0x164d/0x5e70 [ 2853.752836] ? raw_recvmsg+0x790/0x790 [ 2853.753378] ? __lock_acquire+0x164d/0x5e70 [ 2853.754019] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2853.754762] ? __might_fault+0xd1/0x170 [ 2853.755341] ? lock_downgrade+0x6d0/0x6d0 [ 2853.755947] ? selinux_socket_listen+0x2b0/0x2b0 [ 2853.756626] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2853.757292] ? raw_recvmsg+0x790/0x790 [ 2853.757833] inet_sendmsg+0x11d/0x140 [ 2853.758381] ? inet_send_prepare+0x4e0/0x4e0 [ 2853.759000] sock_sendmsg+0x13c/0x190 [ 2853.759532] ____sys_sendmsg+0x744/0x930 [ 2853.760099] ? kernel_sendmsg+0x50/0x50 [ 2853.760649] ? perf_mmap_fault+0x780/0x780 [ 2853.761266] ___sys_sendmsg+0x110/0x1b0 [ 2853.761827] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2853.762485] ? __fget_files+0x24e/0x450 [ 2853.763049] ? lock_downgrade+0x6d0/0x6d0 [ 2853.763643] ? lock_release+0x3b2/0x750 [ 2853.764217] ? ksys_write+0x214/0x250 [ 2853.764782] ? __fget_files+0x270/0x450 [ 2853.765362] ? __fget_light+0xe5/0x280 [ 2853.765941] __sys_sendmsg+0xf3/0x1c0 [ 2853.766490] ? __sys_sendmsg_sock+0x40/0x40 [ 2853.767119] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2853.767827] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2853.768552] do_syscall_64+0x3b/0x90 [ 2853.769075] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2853.769792] RIP: 0033:0x7fe6000ceb19 [ 2853.770303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2853.772753] RSP: 002b:00007fe5fd644188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2853.773773] RAX: ffffffffffffffda RBX: 00007fe6001e1f60 RCX: 00007fe6000ceb19 [ 2853.774740] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2853.775741] RBP: 00007fe5fd6441d0 R08: 0000000000000000 R09: 0000000000000000 [ 2853.776748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2853.777747] R13: 00007ffef9a5345f R14: 00007fe5fd644300 R15: 0000000000022000 [ 2853.778797] 04:00:36 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 58) 04:00:36 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:00:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 25) 04:00:36 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x600, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:00:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 04:00:36 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 6) 04:00:36 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 55) 04:00:36 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 55) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) [ 2853.800537] FAULT_INJECTION: forcing a failure. [ 2853.800537] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2853.802424] CPU: 1 PID: 13195 Comm: syz-executor.1 Not tainted 6.0.0-next-20221014 #1 [ 2853.803538] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2853.804658] Call Trace: [ 2853.805027] [ 2853.805361] dump_stack_lvl+0x8b/0xb3 [ 2853.805916] should_fail.cold+0x5/0xa [ 2853.806482] _copy_from_user+0x2a/0x170 [ 2853.807070] csum_and_copy_from_iter+0x626/0x1470 [ 2853.807783] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2853.808431] ? lock_release+0x3b2/0x750 [ 2853.808450] loop0: detected capacity change from 0 to 4 [ 2853.809788] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2853.810516] ? mark_held_locks+0x9e/0xe0 [ 2853.811116] ip_generic_getfrag+0x173/0x270 [ 2853.811751] ? ip_frag_init+0x350/0x350 [ 2853.812308] ? lock_is_held_type+0xd7/0x130 [ 2853.812938] ? memset+0x20/0x50 [ 2853.813437] raw_getfrag+0x22d/0x290 [ 2853.813976] ? __alloc_skb+0x17b/0x300 [ 2853.814572] __ip_append_data+0x1d7f/0x3aa0 [ 2853.815216] ? raw_destroy+0x30/0x30 [ 2853.815797] ? perf_trace_preemptirq_template+0x274/0x420 [ 2853.816579] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2853.817309] ? lock_is_held_type+0xd7/0x130 [ 2853.817935] ? ipv4_mtu+0x28a/0x380 [ 2853.818451] ? raw_destroy+0x30/0x30 [ 2853.818989] ip_append_data+0x114/0x1a0 [ 2853.819578] raw_sendmsg+0xa97/0x2b80 [ 2853.820146] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2853.820903] ? __lock_acquire+0x164d/0x5e70 [ 2853.821533] ? raw_recvmsg+0x790/0x790 [ 2853.822104] ? __lock_acquire+0x164d/0x5e70 [ 2853.822767] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2853.823531] ? __might_fault+0xd1/0x170 [ 2853.824121] ? lock_downgrade+0x6d0/0x6d0 [ 2853.824764] ? selinux_socket_listen+0x2b0/0x2b0 [ 2853.825465] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2853.826175] ? raw_recvmsg+0x790/0x790 [ 2853.826767] inet_sendmsg+0x11d/0x140 [ 2853.827346] ? inet_send_prepare+0x4e0/0x4e0 [ 2853.828017] sock_sendmsg+0x13c/0x190 [ 2853.828588] ____sys_sendmsg+0x744/0x930 [ 2853.829197] ? kernel_sendmsg+0x50/0x50 [ 2853.829796] ? perf_mmap_fault+0x780/0x780 [ 2853.830431] ___sys_sendmsg+0x110/0x1b0 [ 2853.831010] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2853.831676] ? __fget_files+0x24e/0x450 [ 2853.832244] ? lock_downgrade+0x6d0/0x6d0 [ 2853.832847] ? lock_release+0x3b2/0x750 [ 2853.833421] ? ksys_write+0x214/0x250 [ 2853.833989] ? __fget_files+0x270/0x450 [ 2853.834576] ? __fget_light+0xe5/0x280 [ 2853.835153] __sys_sendmsg+0xf3/0x1c0 [ 2853.835710] ? __sys_sendmsg_sock+0x40/0x40 [ 2853.836358] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2853.837121] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2853.837882] do_syscall_64+0x3b/0x90 [ 2853.838448] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2853.839202] RIP: 0033:0x7fe315a89b19 [ 2853.839755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2853.842257] RSP: 002b:00007fe312fff188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2853.843261] RAX: ffffffffffffffda RBX: 00007fe315b9cf60 RCX: 00007fe315a89b19 [ 2853.844286] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2853.845322] RBP: 00007fe312fff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2853.846350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2853.847393] R13: 00007ffc523f877f R14: 00007fe312fff300 R15: 0000000000022000 [ 2853.848445] [ 2853.851839] loop6: detected capacity change from 0 to 4 [ 2853.863341] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 04:00:36 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 7) [ 2853.945624] EXT4-fs (loop0): invalid first ino: 0 04:00:50 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 59) 04:00:50 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0xbb00, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:00:50 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 8) 04:00:50 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:00:50 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 56) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:00:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 04:00:50 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 56) 04:00:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 26) [ 2867.699937] loop6: detected capacity change from 0 to 4 04:00:50 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 9) [ 2867.710439] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2867.735046] loop0: detected capacity change from 0 to 4 [ 2867.742305] EXT4-fs (loop0): invalid first ino: 0 04:00:50 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 57) [ 2879.951569] loop0: detected capacity change from 0 to 4 [ 2879.957128] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) 04:01:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 27) 04:01:02 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:01:02 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 10) 04:01:02 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 58) 04:01:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000", 0x4b, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 04:01:02 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 60) 04:01:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 57) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:01:02 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1a000, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) [ 2880.009862] loop6: detected capacity change from 0 to 4 [ 2880.029483] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2880.035119] FAULT_INJECTION: forcing a failure. [ 2880.035119] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2880.036828] CPU: 1 PID: 13258 Comm: syz-executor.4 Not tainted 6.0.0-next-20221014 #1 [ 2880.037858] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2880.038923] Call Trace: [ 2880.039267] [ 2880.039582] dump_stack_lvl+0x8b/0xb3 [ 2880.040099] should_fail.cold+0x5/0xa [ 2880.040632] _copy_from_user+0x2a/0x170 [ 2880.041190] csum_and_copy_from_iter+0x626/0x1470 [ 2880.041857] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2880.042459] ? lock_release+0x3b2/0x750 [ 2880.043026] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2880.043688] ? mark_held_locks+0x9e/0xe0 [ 2880.044267] ip_generic_getfrag+0x173/0x270 [ 2880.044893] ? ip_frag_init+0x350/0x350 [ 2880.045464] ? lock_is_held_type+0xd7/0x130 [ 2880.046072] ? memset+0x20/0x50 [ 2880.046565] raw_getfrag+0x22d/0x290 [ 2880.047083] ? __alloc_skb+0x17b/0x300 [ 2880.047637] __ip_append_data+0x1d7f/0x3aa0 [ 2880.048254] ? raw_destroy+0x30/0x30 [ 2880.048788] ? perf_trace_preemptirq_template+0x274/0x420 [ 2880.049555] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2880.050262] ? lock_is_held_type+0xd7/0x130 [ 2880.050881] ? ipv4_mtu+0x28a/0x380 [ 2880.051419] ? raw_destroy+0x30/0x30 [ 2880.051942] ip_append_data+0x114/0x1a0 [ 2880.052515] raw_sendmsg+0xa97/0x2b80 [ 2880.053061] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2880.053792] ? __lock_acquire+0x164d/0x5e70 [ 2880.054411] ? raw_recvmsg+0x790/0x790 [ 2880.054979] ? __lock_acquire+0x164d/0x5e70 [ 2880.055613] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2880.056345] ? __might_fault+0xd1/0x170 [ 2880.056911] ? lock_downgrade+0x6d0/0x6d0 [ 2880.057517] ? selinux_socket_listen+0x2b0/0x2b0 [ 2880.058183] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2880.058861] ? raw_recvmsg+0x790/0x790 [ 2880.059410] inet_sendmsg+0x11d/0x140 [ 2880.059961] ? inet_send_prepare+0x4e0/0x4e0 [ 2880.060592] sock_sendmsg+0x13c/0x190 [ 2880.061129] ____sys_sendmsg+0x744/0x930 [ 2880.061701] ? kernel_sendmsg+0x50/0x50 [ 2880.062271] ? perf_mmap_fault+0x780/0x780 [ 2880.062898] ___sys_sendmsg+0x110/0x1b0 [ 2880.063472] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2880.064136] ? __fget_files+0x24e/0x450 [ 2880.064699] ? lock_downgrade+0x6d0/0x6d0 [ 2880.065292] ? lock_release+0x3b2/0x750 [ 2880.065868] ? ksys_write+0x214/0x250 [ 2880.066433] ? __fget_files+0x270/0x450 [ 2880.067004] ? __fget_light+0xe5/0x280 [ 2880.067569] __sys_sendmsg+0xf3/0x1c0 [ 2880.068108] ? __sys_sendmsg_sock+0x40/0x40 [ 2880.068747] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2880.069473] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2880.070203] do_syscall_64+0x3b/0x90 [ 2880.070717] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2880.071432] RIP: 0033:0x7fe6000ceb19 [ 2880.071936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2880.074350] RSP: 002b:00007fe5fd644188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2880.075344] RAX: ffffffffffffffda RBX: 00007fe6001e1f60 RCX: 00007fe6000ceb19 [ 2880.076318] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2880.077228] RBP: 00007fe5fd6441d0 R08: 0000000000000000 R09: 0000000000000000 [ 2880.078190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2880.079130] R13: 00007ffef9a5345f R14: 00007fe5fd644300 R15: 0000000000022000 [ 2880.080128] 04:01:02 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 11) 04:01:02 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x68000, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:01:02 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 61) [ 2880.145360] FAULT_INJECTION: forcing a failure. 04:01:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000", 0x4b, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) [ 2880.145360] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2880.146533] CPU: 0 PID: 13265 Comm: syz-executor.3 Not tainted 6.0.0-next-20221014 #1 [ 2880.147065] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2880.147613] Call Trace: [ 2880.147789] [ 2880.147951] dump_stack_lvl+0x8b/0xb3 [ 2880.148221] should_fail.cold+0x5/0xa [ 2880.148505] _copy_from_user+0x2a/0x170 [ 2880.148792] csum_and_copy_from_iter+0x626/0x1470 [ 2880.149128] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2880.149439] ? lock_release+0x3b2/0x750 [ 2880.149726] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2880.150067] ? mark_held_locks+0x9e/0xe0 [ 2880.150361] ip_generic_getfrag+0x173/0x270 [ 2880.150671] ? ip_frag_init+0x350/0x350 [ 2880.150970] ? lock_is_held_type+0xd7/0x130 [ 2880.151294] ? memset+0x20/0x50 [ 2880.151550] raw_getfrag+0x22d/0x290 [ 2880.151825] ? __alloc_skb+0x17b/0x300 [ 2880.152112] __ip_append_data+0x1d7f/0x3aa0 [ 2880.152435] ? raw_destroy+0x30/0x30 [ 2880.152720] ? perf_trace_preemptirq_template+0x274/0x420 [ 2880.153128] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2880.153485] ? lock_is_held_type+0xd7/0x130 [ 2880.153801] ? ipv4_mtu+0x28a/0x380 [ 2880.154067] ? raw_destroy+0x30/0x30 [ 2880.154338] ip_append_data+0x114/0x1a0 [ 2880.154623] raw_sendmsg+0xa97/0x2b80 [ 2880.154932] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2880.155320] ? __lock_acquire+0x164d/0x5e70 [ 2880.155646] ? raw_recvmsg+0x790/0x790 [ 2880.155935] ? __lock_acquire+0x164d/0x5e70 [ 2880.156267] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2880.156656] ? __might_fault+0xd1/0x170 [ 2880.156954] ? lock_downgrade+0x6d0/0x6d0 [ 2880.157271] ? selinux_socket_listen+0x2b0/0x2b0 [ 2880.157603] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2880.157954] ? raw_recvmsg+0x790/0x790 [ 2880.158241] inet_sendmsg+0x11d/0x140 [ 2880.158515] ? inet_send_prepare+0x4e0/0x4e0 [ 2880.158851] sock_sendmsg+0x13c/0x190 [ 2880.159134] ____sys_sendmsg+0x744/0x930 [ 2880.159436] ? kernel_sendmsg+0x50/0x50 [ 2880.159727] ? perf_mmap_fault+0x780/0x780 [ 2880.160051] ___sys_sendmsg+0x110/0x1b0 [ 2880.160345] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2880.160689] ? __fget_files+0x24e/0x450 [ 2880.160985] ? lock_downgrade+0x6d0/0x6d0 [ 2880.161278] ? lock_release+0x3b2/0x750 [ 2880.161582] ? ksys_write+0x214/0x250 [ 2880.161861] ? __fget_files+0x270/0x450 [ 2880.162162] ? __fget_light+0xe5/0x280 [ 2880.162439] __sys_sendmsg+0xf3/0x1c0 [ 2880.162737] ? __sys_sendmsg_sock+0x40/0x40 [ 2880.163064] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2880.163417] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2880.163794] do_syscall_64+0x3b/0x90 [ 2880.164056] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2880.164437] RIP: 0033:0x7f7fa6905b19 [ 2880.164694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2880.165966] RSP: 002b:00007f7fa3e7b188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2880.166480] RAX: ffffffffffffffda RBX: 00007f7fa6a18f60 RCX: 00007f7fa6905b19 [ 2880.166998] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2880.167504] RBP: 00007f7fa3e7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2880.168019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2880.168523] R13: 00007ffd9216c86f R14: 00007f7fa3e7b300 R15: 0000000000022000 [ 2880.169055] 04:01:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 28) 04:01:02 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 59) [ 2880.220045] loop0: detected capacity change from 0 to 4 04:01:02 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:01:02 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 12) [ 2880.234394] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) 04:01:02 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 62) [ 2880.316728] loop6: detected capacity change from 0 to 4 [ 2880.340827] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 04:01:02 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x7bc933d, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:01:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000", 0x4b, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 04:01:02 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 13) 04:01:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 58) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:01:02 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() [ 2880.456598] loop0: detected capacity change from 0 to 4 04:01:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 29) [ 2880.487261] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) 04:01:03 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 63) 04:01:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0xf, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) [ 2880.613843] loop6: detected capacity change from 0 to 4 [ 2880.632542] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 04:01:18 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 59) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:01:18 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 60) 04:01:18 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:01:18 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 14) 04:01:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 30) 04:01:18 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0xca87ab7, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:01:18 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 64) 04:01:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000", 0x4c, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) [ 2896.182130] loop6: detected capacity change from 0 to 4 [ 2896.184720] loop0: detected capacity change from 0 to 4 [ 2896.188606] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2896.189501] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2896.238139] FAULT_INJECTION: forcing a failure. [ 2896.238139] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2896.240064] CPU: 0 PID: 13320 Comm: syz-executor.1 Not tainted 6.0.0-next-20221014 #1 [ 2896.241097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2896.242141] Call Trace: [ 2896.242492] [ 2896.242800] dump_stack_lvl+0x8b/0xb3 [ 2896.243352] should_fail.cold+0x5/0xa [ 2896.243888] _copy_from_user+0x2a/0x170 [ 2896.244436] csum_and_copy_from_iter+0x626/0x1470 [ 2896.245115] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2896.245716] ? lock_release+0x3b2/0x750 [ 2896.246260] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2896.246927] ? mark_held_locks+0x9e/0xe0 [ 2896.247489] ip_generic_getfrag+0x173/0x270 [ 2896.248080] ? ip_frag_init+0x350/0x350 [ 2896.248632] ? lock_is_held_type+0xd7/0x130 [ 2896.249211] ? memset+0x20/0x50 [ 2896.249680] raw_getfrag+0x22d/0x290 [ 2896.250188] ? __alloc_skb+0x17b/0x300 [ 2896.250715] __ip_append_data+0x1d7f/0x3aa0 [ 2896.251338] ? raw_destroy+0x30/0x30 [ 2896.251854] ? perf_trace_preemptirq_template+0x274/0x420 [ 2896.252588] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2896.253254] ? lock_is_held_type+0xd7/0x130 [ 2896.253835] ? ipv4_mtu+0x28a/0x380 [ 2896.254344] ? raw_destroy+0x30/0x30 [ 2896.254848] ip_append_data+0x114/0x1a0 [ 2896.255409] raw_sendmsg+0xa97/0x2b80 [ 2896.255936] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2896.256642] ? __lock_acquire+0x164d/0x5e70 [ 2896.257239] ? raw_recvmsg+0x790/0x790 [ 2896.257768] ? __lock_acquire+0x164d/0x5e70 [ 2896.258376] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2896.259077] ? __might_fault+0xd1/0x170 [ 2896.259635] ? lock_downgrade+0x6d0/0x6d0 [ 2896.260214] ? selinux_socket_listen+0x2b0/0x2b0 [ 2896.260858] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2896.261509] ? raw_recvmsg+0x790/0x790 [ 2896.262032] inet_sendmsg+0x11d/0x140 [ 2896.262558] ? inet_send_prepare+0x4e0/0x4e0 [ 2896.263191] sock_sendmsg+0x13c/0x190 [ 2896.263703] ____sys_sendmsg+0x744/0x930 [ 2896.264250] ? kernel_sendmsg+0x50/0x50 [ 2896.264791] ? perf_mmap_fault+0x780/0x780 [ 2896.265378] ___sys_sendmsg+0x110/0x1b0 [ 2896.265921] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2896.266554] ? __fget_files+0x24e/0x450 [ 2896.267112] ? lock_downgrade+0x6d0/0x6d0 [ 2896.267679] ? lock_release+0x3b2/0x750 [ 2896.268227] ? ksys_write+0x214/0x250 [ 2896.268765] ? __fget_files+0x270/0x450 [ 2896.269330] ? __fget_light+0xe5/0x280 [ 2896.269870] __sys_sendmsg+0xf3/0x1c0 [ 2896.270400] ? __sys_sendmsg_sock+0x40/0x40 [ 2896.271037] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2896.271744] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2896.272451] do_syscall_64+0x3b/0x90 [ 2896.272955] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2896.273642] RIP: 0033:0x7fe315a89b19 [ 2896.274140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2896.276447] RSP: 002b:00007fe312fff188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2896.277444] RAX: ffffffffffffffda RBX: 00007fe315b9cf60 RCX: 00007fe315a89b19 [ 2896.278361] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2896.279285] RBP: 00007fe312fff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2896.280199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2896.281123] R13: 00007ffc523f877f R14: 00007fe312fff300 R15: 0000000000022000 [ 2896.282096] 04:01:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 31) 04:01:32 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 61) 04:01:32 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 60) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:01:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000", 0x4c, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 04:01:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:01:32 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 65) 04:01:32 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 15) 04:01:32 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x10, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() [ 2909.552684] loop6: detected capacity change from 0 to 4 [ 2909.559370] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2909.564806] loop0: detected capacity change from 0 to 4 04:01:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 32) [ 2909.596816] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2909.607401] FAULT_INJECTION: forcing a failure. [ 2909.607401] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2909.608407] CPU: 1 PID: 13352 Comm: syz-executor.3 Not tainted 6.0.0-next-20221014 #1 [ 2909.608950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2909.609519] Call Trace: [ 2909.609703] [ 2909.609866] dump_stack_lvl+0x8b/0xb3 [ 2909.610145] should_fail.cold+0x5/0xa [ 2909.610431] _copy_from_user+0x2a/0x170 [ 2909.610720] csum_and_copy_from_iter+0x626/0x1470 [ 2909.611084] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2909.611408] ? lock_release+0x3b2/0x750 [ 2909.611570] FAULT_INJECTION: forcing a failure. [ 2909.611570] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2909.611697] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2909.613584] ? mark_held_locks+0x9e/0xe0 [ 2909.613885] ip_generic_getfrag+0x173/0x270 [ 2909.614212] ? ip_frag_init+0x350/0x350 [ 2909.614503] ? lock_is_held_type+0xd7/0x130 [ 2909.614815] ? memset+0x20/0x50 [ 2909.615074] raw_getfrag+0x22d/0x290 [ 2909.615349] ? __alloc_skb+0x17b/0x300 [ 2909.615631] __ip_append_data+0x1d7f/0x3aa0 [ 2909.615948] ? raw_destroy+0x30/0x30 [ 2909.616213] ? perf_trace_preemptirq_template+0x274/0x420 [ 2909.616608] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2909.616965] ? lock_is_held_type+0xd7/0x130 [ 2909.617270] ? ipv4_mtu+0x28a/0x380 [ 2909.617539] ? raw_destroy+0x30/0x30 [ 2909.617805] ip_append_data+0x114/0x1a0 [ 2909.618094] raw_sendmsg+0xa97/0x2b80 [ 2909.618376] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2909.618747] ? __lock_acquire+0x164d/0x5e70 [ 2909.619042] ? raw_recvmsg+0x790/0x790 [ 2909.619334] ? __lock_acquire+0x164d/0x5e70 [ 2909.619655] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2909.620022] ? __might_fault+0xd1/0x170 [ 2909.620315] ? lock_downgrade+0x6d0/0x6d0 [ 2909.620618] ? selinux_socket_listen+0x2b0/0x2b0 [ 2909.620960] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2909.621300] ? raw_recvmsg+0x790/0x790 [ 2909.621576] inet_sendmsg+0x11d/0x140 [ 2909.621853] ? inet_send_prepare+0x4e0/0x4e0 [ 2909.622160] sock_sendmsg+0x13c/0x190 [ 2909.622439] ____sys_sendmsg+0x744/0x930 [ 2909.622727] ? kernel_sendmsg+0x50/0x50 [ 2909.623003] ? perf_mmap_fault+0x780/0x780 [ 2909.623333] ___sys_sendmsg+0x110/0x1b0 [ 2909.623616] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2909.623944] ? __fget_files+0x24e/0x450 [ 2909.624236] ? lock_downgrade+0x6d0/0x6d0 [ 2909.624546] ? lock_release+0x3b2/0x750 [ 2909.624836] ? ksys_write+0x214/0x250 [ 2909.625119] ? __fget_files+0x270/0x450 [ 2909.625412] ? __fget_light+0xe5/0x280 [ 2909.625686] __sys_sendmsg+0xf3/0x1c0 [ 2909.625964] ? __sys_sendmsg_sock+0x40/0x40 [ 2909.626287] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2909.626634] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2909.627007] do_syscall_64+0x3b/0x90 [ 2909.627271] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2909.627641] RIP: 0033:0x7f7fa6905b19 [ 2909.627891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2909.629115] RSP: 002b:00007f7fa3e7b188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2909.629619] RAX: ffffffffffffffda RBX: 00007f7fa6a18f60 RCX: 00007f7fa6905b19 [ 2909.630107] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2909.630600] RBP: 00007f7fa3e7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2909.631104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2909.631604] R13: 00007ffd9216c86f R14: 00007f7fa3e7b300 R15: 0000000000022000 [ 2909.632116] [ 2909.632340] CPU: 0 PID: 13348 Comm: syz-executor.4 Not tainted 6.0.0-next-20221014 #1 [ 2909.633510] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2909.634738] Call Trace: [ 2909.635155] [ 2909.635504] dump_stack_lvl+0x8b/0xb3 [ 2909.636103] should_fail.cold+0x5/0xa [ 2909.636716] _copy_from_user+0x2a/0x170 [ 2909.637292] csum_and_copy_from_iter+0x626/0x1470 [ 2909.637938] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2909.638537] ? lock_release+0x3b2/0x750 [ 2909.639093] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2909.639718] ? mark_held_locks+0x9e/0xe0 [ 2909.640272] ip_generic_getfrag+0x173/0x270 [ 2909.640847] ? ip_frag_init+0x350/0x350 [ 2909.641387] ? lock_is_held_type+0xd7/0x130 [ 2909.641956] ? memset+0x20/0x50 [ 2909.642416] raw_getfrag+0x22d/0x290 [ 2909.642908] ? __alloc_skb+0x17b/0x300 [ 2909.643415] __ip_append_data+0x1d7f/0x3aa0 [ 2909.643997] ? raw_destroy+0x30/0x30 [ 2909.644496] ? perf_trace_preemptirq_template+0x274/0x420 [ 2909.645211] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2909.645858] ? lock_is_held_type+0xd7/0x130 [ 2909.646418] ? ipv4_mtu+0x28a/0x380 [ 2909.646913] ? raw_destroy+0x30/0x30 [ 2909.647395] ip_append_data+0x114/0x1a0 [ 2909.647938] raw_sendmsg+0xa97/0x2b80 [ 2909.648455] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2909.649143] ? __lock_acquire+0x164d/0x5e70 [ 2909.649725] ? raw_recvmsg+0x790/0x790 [ 2909.650234] ? __lock_acquire+0x164d/0x5e70 [ 2909.650836] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2909.651554] ? __might_fault+0xd1/0x170 [ 2909.652088] ? lock_downgrade+0x6d0/0x6d0 [ 2909.652638] ? selinux_socket_listen+0x2b0/0x2b0 [ 2909.653263] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2909.653893] ? raw_recvmsg+0x790/0x790 [ 2909.654411] inet_sendmsg+0x11d/0x140 [ 2909.654923] ? inet_send_prepare+0x4e0/0x4e0 [ 2909.655490] sock_sendmsg+0x13c/0x190 [ 2909.656000] ____sys_sendmsg+0x744/0x930 [ 2909.656532] ? kernel_sendmsg+0x50/0x50 [ 2909.657060] ? perf_mmap_fault+0x780/0x780 [ 2909.657635] ___sys_sendmsg+0x110/0x1b0 [ 2909.658173] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2909.658775] ? __fget_files+0x24e/0x450 [ 2909.659311] ? lock_downgrade+0x6d0/0x6d0 [ 2909.659850] ? lock_release+0x3b2/0x750 [ 2909.660368] ? ksys_write+0x214/0x250 [ 2909.660880] ? __fget_files+0x270/0x450 [ 2909.661409] ? __fget_light+0xe5/0x280 [ 2909.661921] __sys_sendmsg+0xf3/0x1c0 [ 2909.662400] ? __sys_sendmsg_sock+0x40/0x40 [ 2909.662970] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2909.663620] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2909.664277] do_syscall_64+0x3b/0x90 [ 2909.664751] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2909.665413] RIP: 0033:0x7fe6000ceb19 [ 2909.665874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2909.668078] RSP: 002b:00007fe5fd644188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2909.668992] RAX: ffffffffffffffda RBX: 00007fe6001e1f60 RCX: 00007fe6000ceb19 [ 2909.669875] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2909.670742] RBP: 00007fe5fd6441d0 R08: 0000000000000000 R09: 0000000000000000 [ 2909.671636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2909.672495] R13: 00007ffef9a5345f R14: 00007fe5fd644300 R15: 0000000000022000 [ 2909.673395] [ 2909.675405] loop6: detected capacity change from 0 to 4 [ 2909.684336] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 04:01:32 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x10, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:01:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 33) 04:01:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x2, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:01:32 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 62) 04:01:32 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 61) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:01:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000", 0x4c, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="006e65d74591fd202655d5296c04c3d69fe822a7c4bd92567542878c83b4ef5127140a9f14aa72ecc01922520ac0334444cd41a1b3b73471dbf3064b11acfb0ed427a9ffcd9ff54eb279e399d348517a31057cdd24d4ee2ae83ccc654b4b0a3e09b3d30fee1fa11ed3001586de50ff78a08d04eb1a16479a57913b15969b1d46857999eadeb4488f69355c9c2b72894702cbaf3a77bfcee237ec4e7d2f449ccebe45a80081b67ea60dd3c392c952043b2dc6e7b6b242a414e0291a7bc6bfcbdfafc92eb8b50cfcb21688c4e636398f5c22bf6c6e4455867f0a63c2f2cb099a48910a3c6d7ac76da9647d969b5450c88e34710a2e720600000000000000f66a603371aa09a2000000000000"]) 04:01:32 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 66) [ 2909.843610] loop0: detected capacity change from 0 to 4 [ 2909.857715] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2909.866523] loop6: detected capacity change from 0 to 4 [ 2909.870081] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2909.881302] FAULT_INJECTION: forcing a failure. [ 2909.881302] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2909.882107] CPU: 1 PID: 13370 Comm: syz-executor.4 Not tainted 6.0.0-next-20221014 #1 [ 2909.882619] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2909.883155] Call Trace: [ 2909.883336] [ 2909.883495] dump_stack_lvl+0x8b/0xb3 [ 2909.883768] should_fail.cold+0x5/0xa [ 2909.884033] _copy_from_user+0x2a/0x170 [ 2909.884319] csum_and_copy_from_iter+0x626/0x1470 [ 2909.884662] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2909.885020] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2909.885322] ? lockdep_hardirqs_on+0x79/0x100 [ 2909.885630] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2909.886005] ip_generic_getfrag+0x173/0x270 [ 2909.886306] ? ip_frag_init+0x350/0x350 [ 2909.886580] ? lock_is_held_type+0xd7/0x130 [ 2909.886883] ? memset+0x20/0x50 [ 2909.887140] raw_getfrag+0x22d/0x290 [ 2909.887410] ? __alloc_skb+0x17b/0x300 [ 2909.887682] __ip_append_data+0x1d7f/0x3aa0 [ 2909.887982] ? raw_destroy+0x30/0x30 [ 2909.888245] ? perf_trace_preemptirq_template+0x274/0x420 [ 2909.888614] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2909.888950] ? lock_is_held_type+0xd7/0x130 [ 2909.889243] ? ipv4_mtu+0x28a/0x380 [ 2909.889512] ? raw_destroy+0x30/0x30 [ 2909.889762] ip_append_data+0x114/0x1a0 [ 2909.890037] raw_sendmsg+0xa97/0x2b80 [ 2909.890307] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2909.890676] ? __lock_acquire+0x164d/0x5e70 [ 2909.890994] ? raw_recvmsg+0x790/0x790 [ 2909.891280] ? __lock_acquire+0x164d/0x5e70 [ 2909.891607] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2909.891988] ? __might_fault+0xd1/0x170 [ 2909.892285] ? lock_downgrade+0x6d0/0x6d0 [ 2909.892608] ? selinux_socket_listen+0x2b0/0x2b0 [ 2909.892960] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2909.893307] ? raw_recvmsg+0x790/0x790 [ 2909.893586] inet_sendmsg+0x11d/0x140 [ 2909.893869] ? inet_send_prepare+0x4e0/0x4e0 [ 2909.894194] sock_sendmsg+0x13c/0x190 [ 2909.894477] ____sys_sendmsg+0x744/0x930 [ 2909.894772] ? kernel_sendmsg+0x50/0x50 [ 2909.895075] ? perf_mmap_fault+0x780/0x780 [ 2909.895396] ___sys_sendmsg+0x110/0x1b0 [ 2909.895688] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2909.896020] ? __fget_files+0x24e/0x450 [ 2909.896311] ? lock_downgrade+0x6d0/0x6d0 [ 2909.896623] ? lock_release+0x3b2/0x750 [ 2909.896936] ? ksys_write+0x214/0x250 [ 2909.897238] ? __fget_files+0x270/0x450 [ 2909.897535] ? __fget_light+0xe5/0x280 [ 2909.897821] __sys_sendmsg+0xf3/0x1c0 [ 2909.898101] ? __sys_sendmsg_sock+0x40/0x40 [ 2909.898428] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2909.898794] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2909.899167] do_syscall_64+0x3b/0x90 [ 2909.899437] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2909.899811] RIP: 0033:0x7fe6000ceb19 [ 2909.900091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2909.901348] RSP: 002b:00007fe5fd644188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2909.901889] RAX: ffffffffffffffda RBX: 00007fe6001e1f60 RCX: 00007fe6000ceb19 [ 2909.902398] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2909.902895] RBP: 00007fe5fd6441d0 R08: 0000000000000000 R09: 0000000000000000 [ 2909.903396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2909.903903] R13: 00007ffef9a5345f R14: 00007fe5fd644300 R15: 0000000000022000 [ 2909.904425] 04:01:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="006e65d74591fd202655d5296c04c3d69fe822a7c4bd92567542878c83b4ef5127140a9f14aa72ecc01922520ac0334444cd41a1b3b73471dbf3064b11acfb0ed427a9ffcd9ff54eb279e399d348517a31057cdd24d4ee2ae83ccc654b4b0a3e09b3d30fee1fa11ed3001586de50ff78a08d04eb1a16479a57913b15969b1d46857999eadeb4488f69355c9c2b72894702cbaf3a77bfcee237ec4e7d2f449ccebe45a80081b67ea60dd3c392c952043b2dc6e7b6b242a414e0291a7bc6bfcbdfafc92eb8b50cfcb21688c4e636398f5c22bf6c6e4455867f0a63c2f2cb099a48910a3c6d7ac76da9647d969b5450c88e34710a2e720600000000000000f66a603371aa09a2000000000000"]) 04:01:32 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 67) 04:01:32 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x10, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() [ 2910.029744] FAULT_INJECTION: forcing a failure. [ 2910.029744] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2910.030784] CPU: 1 PID: 13377 Comm: syz-executor.3 Not tainted 6.0.0-next-20221014 #1 [ 2910.031298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2910.031831] Call Trace: [ 2910.032004] [ 2910.032162] dump_stack_lvl+0x8b/0xb3 [ 2910.032430] should_fail.cold+0x5/0xa [ 2910.032699] _copy_from_user+0x2a/0x170 [ 2910.032976] csum_and_copy_from_iter+0x626/0x1470 [ 2910.033317] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2910.033622] ? lock_release+0x3b2/0x750 [ 2910.033896] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2910.034239] ? mark_held_locks+0x9e/0xe0 [ 2910.034525] ip_generic_getfrag+0x173/0x270 [ 2910.034835] ? ip_frag_init+0x350/0x350 [ 2910.035143] ? lock_is_held_type+0xd7/0x130 [ 2910.035444] ? memset+0x20/0x50 [ 2910.035685] raw_getfrag+0x22d/0x290 [ 2910.035936] ? __alloc_skb+0x17b/0x300 [ 2910.036209] __ip_append_data+0x1d7f/0x3aa0 [ 2910.036511] ? raw_destroy+0x30/0x30 [ 2910.036773] ? perf_trace_preemptirq_template+0x274/0x420 [ 2910.037147] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2910.037488] ? lock_is_held_type+0xd7/0x130 [ 2910.037777] ? ipv4_mtu+0x28a/0x380 [ 2910.038046] ? raw_destroy+0x30/0x30 [ 2910.038299] ip_append_data+0x114/0x1a0 [ 2910.038575] raw_sendmsg+0xa97/0x2b80 [ 2910.038857] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2910.039218] ? __lock_acquire+0x164d/0x5e70 [ 2910.039520] ? raw_recvmsg+0x790/0x790 [ 2910.039791] ? __lock_acquire+0x164d/0x5e70 [ 2910.040111] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2910.040488] ? __might_fault+0xd1/0x170 [ 2910.040783] ? lock_downgrade+0x6d0/0x6d0 [ 2910.041096] ? selinux_socket_listen+0x2b0/0x2b0 [ 2910.041439] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2910.041795] ? raw_recvmsg+0x790/0x790 [ 2910.042078] inet_sendmsg+0x11d/0x140 [ 2910.042365] ? inet_send_prepare+0x4e0/0x4e0 [ 2910.042698] sock_sendmsg+0x13c/0x190 [ 2910.042984] ____sys_sendmsg+0x744/0x930 [ 2910.043282] ? kernel_sendmsg+0x50/0x50 [ 2910.043569] ? perf_mmap_fault+0x780/0x780 [ 2910.043885] ___sys_sendmsg+0x110/0x1b0 [ 2910.044176] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2910.044514] ? __fget_files+0x24e/0x450 [ 2910.044800] ? lock_downgrade+0x6d0/0x6d0 [ 2910.045100] ? lock_release+0x3b2/0x750 [ 2910.045389] ? ksys_write+0x214/0x250 [ 2910.045681] ? __fget_files+0x270/0x450 [ 2910.045993] ? __fget_light+0xe5/0x280 [ 2910.046285] __sys_sendmsg+0xf3/0x1c0 [ 2910.046566] ? __sys_sendmsg_sock+0x40/0x40 [ 2910.046895] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2910.047282] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2910.047660] do_syscall_64+0x3b/0x90 [ 2910.047931] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2910.048313] RIP: 0033:0x7f7fa6905b19 [ 2910.048581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2910.049828] RSP: 002b:00007f7fa3e7b188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2910.050352] RAX: ffffffffffffffda RBX: 00007f7fa6a18f60 RCX: 00007f7fa6905b19 [ 2910.050840] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2910.051342] RBP: 00007f7fa3e7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2910.051847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2910.052342] R13: 00007ffd9216c86f R14: 00007f7fa3e7b300 R15: 0000000000022000 [ 2910.052856] [ 2910.077764] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 04:01:49 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:01:49 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 63) 04:01:49 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 68) 04:01:49 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 16) 04:01:49 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x3, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:01:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 34) 04:01:49 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 62) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) [ 2926.585969] loop6: detected capacity change from 0 to 4 04:01:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) [ 2926.609514] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2926.628141] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 04:01:49 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x4, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:01:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 35) 04:01:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="006e65d74591fd202655d5296c04c3d69fe822a7c4bd92567542878c83b4ef5127140a9f14aa72ecc01922520ac0334444cd41a1b3b73471dbf3064b11acfb0ed427a9ffcd9ff54eb279e399d348517a31057cdd24d4ee2ae83ccc654b4b0a3e09b3d30fee1fa11ed3001586de50ff78a08d04eb1a16479a57913b15969b1d46857999eadeb4488f69355c9c2b72894702cbaf3a77bfcee237ec4e7d2f449ccebe45a80081b67ea60dd3c392c952043b2dc6e7b6b242a414e0291a7bc6bfcbdfafc92eb8b50cfcb21688c4e636398f5c22bf6c6e4455867f0a63c2f2cb099a48910a3c6d7ac76da9647d969b5450c88e34710a2e720600000000000000f66a603371aa09a2000000000000"]) 04:01:49 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 63) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) [ 2926.736521] loop6: detected capacity change from 0 to 4 [ 2926.749572] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2926.756102] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 04:01:49 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x6, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:01:49 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 69) 04:01:49 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 17) 04:02:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, 0x0) 04:02:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 36) 04:02:03 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 18) 04:02:03 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:02:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x8, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:02:03 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 70) [ 2940.729826] loop6: detected capacity change from 0 to 4 [ 2940.737538] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2940.746512] loop0: detected capacity change from 0 to 4 [ 2940.777422] FAULT_INJECTION: forcing a failure. [ 2940.777422] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2940.778337] CPU: 0 PID: 13447 Comm: syz-executor.3 Not tainted 6.0.0-next-20221014 #1 [ 2940.778873] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2940.779417] Call Trace: [ 2940.779614] [ 2940.779776] dump_stack_lvl+0x8b/0xb3 [ 2940.780051] should_fail.cold+0x5/0xa [ 2940.780329] _copy_from_user+0x2a/0x170 [ 2940.780615] csum_and_copy_from_iter+0x626/0x1470 [ 2940.780956] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2940.781265] ? lock_release+0x3b2/0x750 [ 2940.781552] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2940.781899] ? mark_held_locks+0x9e/0xe0 [ 2940.782190] ip_generic_getfrag+0x173/0x270 [ 2940.782496] ? ip_frag_init+0x350/0x350 [ 2940.782781] ? lock_is_held_type+0xd7/0x130 [ 2940.783087] ? memset+0x20/0x50 [ 2940.783335] raw_getfrag+0x22d/0x290 [ 2940.783600] ? __alloc_skb+0x17b/0x300 [ 2940.783881] __ip_append_data+0x1d7f/0x3aa0 [ 2940.784184] ? raw_destroy+0x30/0x30 [ 2940.784450] ? perf_trace_preemptirq_template+0x274/0x420 [ 2940.785032] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2940.785379] ? lock_is_held_type+0xd7/0x130 [ 2940.785671] ? ipv4_mtu+0x28a/0x380 [ 2940.785934] ? raw_destroy+0x30/0x30 [ 2940.786191] ip_append_data+0x114/0x1a0 [ 2940.786474] raw_sendmsg+0xa97/0x2b80 [ 2940.786750] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2940.787127] ? __lock_acquire+0x164d/0x5e70 [ 2940.787446] ? raw_recvmsg+0x790/0x790 [ 2940.787777] ? __lock_acquire+0x164d/0x5e70 [ 2940.788097] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2940.788481] ? __might_fault+0xd1/0x170 [ 2940.788772] ? lock_downgrade+0x6d0/0x6d0 [ 2940.789085] ? selinux_socket_listen+0x2b0/0x2b0 [ 2940.789418] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2940.789765] ? raw_recvmsg+0x790/0x790 [ 2940.790044] inet_sendmsg+0x11d/0x140 [ 2940.790330] ? inet_send_prepare+0x4e0/0x4e0 [ 2940.790658] sock_sendmsg+0x13c/0x190 [ 2940.790936] ____sys_sendmsg+0x744/0x930 [ 2940.791215] ? kernel_sendmsg+0x50/0x50 [ 2940.791506] ? perf_mmap_fault+0x780/0x780 [ 2940.791827] ___sys_sendmsg+0x110/0x1b0 [ 2940.792116] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2940.792453] ? __fget_files+0x24e/0x450 [ 2940.792745] ? lock_downgrade+0x6d0/0x6d0 [ 2940.793051] ? lock_release+0x3b2/0x750 [ 2940.793342] ? ksys_write+0x214/0x250 [ 2940.793632] ? __fget_files+0x270/0x450 [ 2940.793929] ? __fget_light+0xe5/0x280 [ 2940.794226] __sys_sendmsg+0xf3/0x1c0 [ 2940.794488] ? __sys_sendmsg_sock+0x40/0x40 [ 2940.794816] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2940.795186] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2940.795545] do_syscall_64+0x3b/0x90 [ 2940.795818] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2940.796186] RIP: 0033:0x7f7fa6905b19 [ 2940.796459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2940.797697] RSP: 002b:00007f7fa3e7b188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2940.798229] RAX: ffffffffffffffda RBX: 00007f7fa6a18f60 RCX: 00007f7fa6905b19 [ 2940.798720] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2940.799213] RBP: 00007f7fa3e7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2940.799716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2940.800209] R13: 00007ffd9216c86f R14: 00007f7fa3e7b300 R15: 0000000000022000 [ 2940.800722] 04:02:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 64) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:02:03 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 64) 04:02:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 37) 04:02:03 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 19) [ 2940.866893] loop6: detected capacity change from 0 to 4 04:02:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, 0x0) 04:02:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 38) 04:02:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 65) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:02:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0xe, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:02:03 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() [ 2940.966420] loop0: detected capacity change from 0 to 4 [ 2940.972599] loop6: detected capacity change from 0 to 4 [ 2940.977713] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 04:02:03 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 71) 04:02:03 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 65) [ 2941.030697] FAULT_INJECTION: forcing a failure. [ 2941.030697] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2941.031667] CPU: 0 PID: 13462 Comm: syz-executor.4 Not tainted 6.0.0-next-20221014 #1 [ 2941.032212] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2941.032753] Call Trace: [ 2941.032929] [ 2941.033090] dump_stack_lvl+0x8b/0xb3 [ 2941.033371] should_fail.cold+0x5/0xa [ 2941.033642] _copy_from_user+0x2a/0x170 [ 2941.033928] csum_and_copy_from_iter+0x626/0x1470 [ 2941.034272] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2941.034583] ? lock_release+0x3b2/0x750 [ 2941.034860] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2941.035202] ? mark_held_locks+0x9e/0xe0 [ 2941.035503] ip_generic_getfrag+0x173/0x270 [ 2941.035811] ? ip_frag_init+0x350/0x350 [ 2941.036087] ? lock_is_held_type+0xd7/0x130 [ 2941.036393] ? memset+0x20/0x50 [ 2941.036633] raw_getfrag+0x22d/0x290 [ 2941.036897] ? __alloc_skb+0x17b/0x300 [ 2941.037177] __ip_append_data+0x1d7f/0x3aa0 [ 2941.037489] ? raw_destroy+0x30/0x30 [ 2941.037759] ? perf_trace_preemptirq_template+0x274/0x420 [ 2941.038144] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2941.038493] ? lock_is_held_type+0xd7/0x130 [ 2941.038789] ? ipv4_mtu+0x28a/0x380 [ 2941.039060] ? raw_destroy+0x30/0x30 [ 2941.039321] ip_append_data+0x114/0x1a0 [ 2941.039609] raw_sendmsg+0xa97/0x2b80 [ 2941.039878] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2941.040236] ? __lock_acquire+0x164d/0x5e70 [ 2941.040542] ? raw_recvmsg+0x790/0x790 [ 2941.040813] ? __lock_acquire+0x164d/0x5e70 [ 2941.041122] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2941.041493] ? __might_fault+0xd1/0x170 [ 2941.041785] ? lock_downgrade+0x6d0/0x6d0 [ 2941.042094] ? selinux_socket_listen+0x2b0/0x2b0 [ 2941.042433] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2941.042760] ? raw_recvmsg+0x790/0x790 [ 2941.043041] inet_sendmsg+0x11d/0x140 [ 2941.043313] ? inet_send_prepare+0x4e0/0x4e0 [ 2941.043650] sock_sendmsg+0x13c/0x190 [ 2941.043925] ____sys_sendmsg+0x744/0x930 [ 2941.044220] ? kernel_sendmsg+0x50/0x50 [ 2941.044508] ? perf_mmap_fault+0x780/0x780 [ 2941.044819] ___sys_sendmsg+0x110/0x1b0 [ 2941.045106] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2941.045437] ? __fget_files+0x24e/0x450 [ 2941.045712] ? lock_downgrade+0x6d0/0x6d0 [ 2941.046003] ? lock_release+0x3b2/0x750 [ 2941.046293] ? ksys_write+0x214/0x250 [ 2941.046567] ? __fget_files+0x270/0x450 [ 2941.046862] ? __fget_light+0xe5/0x280 [ 2941.047137] __sys_sendmsg+0xf3/0x1c0 [ 2941.047412] ? __sys_sendmsg_sock+0x40/0x40 [ 2941.047722] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2941.048088] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2941.048445] do_syscall_64+0x3b/0x90 [ 2941.048713] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2941.049062] RIP: 0033:0x7fe6000ceb19 [ 2941.049329] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2941.050499] RSP: 002b:00007fe5fd644188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2941.051023] RAX: ffffffffffffffda RBX: 00007fe6001e1f60 RCX: 00007fe6000ceb19 [ 2941.051505] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2941.051991] RBP: 00007fe5fd6441d0 R08: 0000000000000000 R09: 0000000000000000 [ 2941.052481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2941.052968] R13: 00007ffef9a5345f R14: 00007fe5fd644300 R15: 0000000000022000 [ 2941.053473] [ 2941.114716] FAULT_INJECTION: forcing a failure. [ 2941.114716] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2941.115618] CPU: 0 PID: 13469 Comm: syz-executor.3 Not tainted 6.0.0-next-20221014 #1 [ 2941.116133] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2941.116670] Call Trace: [ 2941.116846] [ 2941.117004] dump_stack_lvl+0x8b/0xb3 [ 2941.117268] should_fail.cold+0x5/0xa [ 2941.117547] _copy_from_user+0x2a/0x170 [ 2941.117828] csum_and_copy_from_iter+0x626/0x1470 [ 2941.118165] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2941.118484] ? lock_release+0x3b2/0x750 [ 2941.118765] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2941.119102] ? mark_held_locks+0x9e/0xe0 [ 2941.119399] ip_generic_getfrag+0x173/0x270 [ 2941.119709] ? ip_frag_init+0x350/0x350 [ 2941.120002] ? lock_is_held_type+0xd7/0x130 [ 2941.120306] ? memset+0x20/0x50 [ 2941.120550] raw_getfrag+0x22d/0x290 [ 2941.120814] ? __alloc_skb+0x17b/0x300 [ 2941.121085] __ip_append_data+0x1d7f/0x3aa0 [ 2941.121389] ? raw_destroy+0x30/0x30 [ 2941.121649] ? perf_trace_preemptirq_template+0x274/0x420 [ 2941.122029] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2941.122374] ? lock_is_held_type+0xd7/0x130 [ 2941.122669] ? ipv4_mtu+0x28a/0x380 [ 2941.122931] ? raw_destroy+0x30/0x30 [ 2941.123192] ip_append_data+0x114/0x1a0 [ 2941.123487] raw_sendmsg+0xa97/0x2b80 [ 2941.123760] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2941.124110] ? __lock_acquire+0x164d/0x5e70 [ 2941.124411] ? raw_recvmsg+0x790/0x790 [ 2941.124677] ? __lock_acquire+0x164d/0x5e70 [ 2941.124988] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2941.125342] ? __might_fault+0xd1/0x170 [ 2941.125623] ? lock_downgrade+0x6d0/0x6d0 [ 2941.125927] ? selinux_socket_listen+0x2b0/0x2b0 [ 2941.126276] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2941.126617] ? raw_recvmsg+0x790/0x790 [ 2941.126887] inet_sendmsg+0x11d/0x140 [ 2941.127172] ? inet_send_prepare+0x4e0/0x4e0 [ 2941.127487] sock_sendmsg+0x13c/0x190 [ 2941.127758] ____sys_sendmsg+0x744/0x930 [ 2941.128052] ? kernel_sendmsg+0x50/0x50 [ 2941.128344] ? perf_mmap_fault+0x780/0x780 [ 2941.128646] ___sys_sendmsg+0x110/0x1b0 [ 2941.128938] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2941.129255] ? __fget_files+0x24e/0x450 [ 2941.129542] ? lock_downgrade+0x6d0/0x6d0 [ 2941.129831] ? lock_release+0x3b2/0x750 [ 2941.130122] ? ksys_write+0x214/0x250 [ 2941.130403] ? __fget_files+0x270/0x450 [ 2941.130700] ? __fget_light+0xe5/0x280 [ 2941.130983] __sys_sendmsg+0xf3/0x1c0 [ 2941.131264] ? __sys_sendmsg_sock+0x40/0x40 [ 2941.131589] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2941.131966] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2941.132336] do_syscall_64+0x3b/0x90 [ 2941.132610] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2941.132965] RIP: 0033:0x7f7fa6905b19 [ 2941.133230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2941.134403] RSP: 002b:00007f7fa3e7b188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2941.134938] RAX: ffffffffffffffda RBX: 00007f7fa6a18f60 RCX: 00007f7fa6905b19 [ 2941.135412] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2941.135912] RBP: 00007f7fa3e7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2941.136399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2941.136894] R13: 00007ffd9216c86f R14: 00007f7fa3e7b300 R15: 0000000000022000 [ 2941.137398] 04:02:18 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, 0x0) fork() 04:02:18 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 72) 04:02:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, 0x0) 04:02:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 39) 04:02:18 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 20) 04:02:18 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 66) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:02:18 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 66) [ 2955.880854] loop0: detected capacity change from 0 to 4 04:02:18 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x10, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) [ 2955.897809] loop6: detected capacity change from 0 to 4 [ 2955.898351] FAULT_INJECTION: forcing a failure. [ 2955.898351] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2955.899370] CPU: 0 PID: 13492 Comm: syz-executor.6 Not tainted 6.0.0-next-20221014 #1 [ 2955.900058] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2955.900769] Call Trace: [ 2955.901003] [ 2955.901203] dump_stack_lvl+0x8b/0xb3 [ 2955.901539] should_fail.cold+0x5/0xa [ 2955.901881] strncpy_from_user+0x34/0x3e0 [ 2955.902253] getname_flags.part.0+0x95/0x4f0 [ 2955.902648] __x64_sys_mkdir+0xda/0x140 [ 2955.902997] do_syscall_64+0x3b/0x90 [ 2955.903311] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2955.903771] RIP: 0033:0x7fae97d4ac27 [ 2955.904094] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2955.905609] RSP: 002b:00007fae952c0fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2955.906084] RAX: ffffffffffffffda RBX: 0000000020000580 RCX: 00007fae97d4ac27 [ 2955.906660] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2955.907258] RBP: 00007fae952c1040 R08: 0000000000000000 R09: ffffffffffffffff [ 2955.907872] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2955.908480] R13: 0000000020000100 R14: 00007fae952c1000 R15: 0000000020000440 [ 2955.909092] 04:02:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) 04:02:18 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 21) 04:02:18 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 67) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:02:18 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 73) [ 2956.053465] loop0: detected capacity change from 0 to 4 [ 2956.061618] EXT4-fs (loop0): invalid first ino: 0 04:02:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 40) 04:02:18 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 67) 04:02:18 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x60, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) [ 2956.174284] loop6: detected capacity change from 0 to 4 04:02:18 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, 0x0) fork() 04:02:18 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 68) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:02:18 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 74) [ 2956.194410] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2956.237047] FAULT_INJECTION: forcing a failure. [ 2956.237047] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2956.238732] CPU: 1 PID: 13511 Comm: syz-executor.1 Not tainted 6.0.0-next-20221014 #1 [ 2956.239760] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2956.240802] Call Trace: [ 2956.241141] [ 2956.241450] dump_stack_lvl+0x8b/0xb3 [ 2956.241970] should_fail.cold+0x5/0xa [ 2956.242499] _copy_from_user+0x2a/0x170 [ 2956.243043] csum_and_copy_from_iter+0x626/0x1470 [ 2956.243709] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2956.244301] ? lock_release+0x3b2/0x750 [ 2956.244844] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2956.245504] ? mark_held_locks+0x9e/0xe0 [ 2956.246059] ip_generic_getfrag+0x173/0x270 [ 2956.246641] ? ip_frag_init+0x350/0x350 [ 2956.247187] ? lock_is_held_type+0xd7/0x130 [ 2956.247778] ? memset+0x20/0x50 [ 2956.248243] raw_getfrag+0x22d/0x290 [ 2956.248732] ? __alloc_skb+0x17b/0x300 [ 2956.249253] __ip_append_data+0x1d7f/0x3aa0 [ 2956.249842] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2956.250546] ? raw_destroy+0x30/0x30 [ 2956.251055] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2956.251738] ? ip_setup_cork+0x4c/0x9b0 [ 2956.252258] ? ipv4_mtu+0x28a/0x380 [ 2956.252757] ? raw_destroy+0x30/0x30 [ 2956.253253] ip_append_data+0x114/0x1a0 [ 2956.253795] raw_sendmsg+0xa97/0x2b80 [ 2956.254315] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2956.254971] ? __lock_acquire+0x164d/0x5e70 [ 2956.255558] ? raw_recvmsg+0x790/0x790 [ 2956.256096] ? __lock_acquire+0x164d/0x5e70 [ 2956.256705] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2956.257405] ? __might_fault+0xd1/0x170 [ 2956.257945] ? lock_downgrade+0x6d0/0x6d0 [ 2956.258521] ? selinux_socket_listen+0x2b0/0x2b0 [ 2956.259159] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2956.259824] ? raw_recvmsg+0x790/0x790 [ 2956.260355] inet_sendmsg+0x11d/0x140 [ 2956.260887] ? inet_send_prepare+0x4e0/0x4e0 [ 2956.261489] sock_sendmsg+0x13c/0x190 [ 2956.261982] ____sys_sendmsg+0x744/0x930 [ 2956.262529] ? kernel_sendmsg+0x50/0x50 [ 2956.263055] ? perf_mmap_fault+0x780/0x780 [ 2956.263643] ___sys_sendmsg+0x110/0x1b0 [ 2956.264192] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2956.264815] ? __fget_files+0x24e/0x450 [ 2956.265341] ? lock_downgrade+0x6d0/0x6d0 [ 2956.265907] ? lock_release+0x3b2/0x750 [ 2956.266452] ? ksys_write+0x214/0x250 [ 2956.266987] ? __fget_files+0x270/0x450 [ 2956.267520] ? __fget_light+0xe5/0x280 [ 2956.268057] __sys_sendmsg+0xf3/0x1c0 [ 2956.268579] ? __sys_sendmsg_sock+0x40/0x40 [ 2956.269181] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2956.269858] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2956.270550] do_syscall_64+0x3b/0x90 [ 2956.271049] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2956.271771] RIP: 0033:0x7fe315a89b19 [ 2956.272261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2956.274547] RSP: 002b:00007fe312fff188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2956.275528] RAX: ffffffffffffffda RBX: 00007fe315b9cf60 RCX: 00007fe315a89b19 [ 2956.276440] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2956.277359] RBP: 00007fe312fff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2956.278275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2956.279183] R13: 00007ffc523f877f R14: 00007fe312fff300 R15: 0000000000022000 [ 2956.280471] [ 2956.363892] loop6: detected capacity change from 0 to 4 04:02:18 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 75) 04:02:18 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 69) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:02:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 41) 04:02:18 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x1f4, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:02:34 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 70) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:02:34 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 22) 04:02:34 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x300, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:02:34 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, 0x0) fork() 04:02:34 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 42) 04:02:34 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x8, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:02:34 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 68) 04:02:34 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 76) [ 2972.068288] loop6: detected capacity change from 0 to 4 [ 2972.072057] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 2972.108724] FAULT_INJECTION: forcing a failure. [ 2972.108724] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2972.109682] CPU: 1 PID: 13556 Comm: syz-executor.4 Not tainted 6.0.0-next-20221014 #1 [ 2972.110201] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2972.110757] Call Trace: [ 2972.110932] [ 2972.111092] dump_stack_lvl+0x8b/0xb3 [ 2972.111367] should_fail.cold+0x5/0xa [ 2972.111647] _copy_from_user+0x2a/0x170 [ 2972.111946] csum_and_copy_from_iter+0x626/0x1470 [ 2972.112297] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 2972.112604] ? lock_release+0x3b2/0x750 [ 2972.112891] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 2972.113241] ? mark_held_locks+0x9e/0xe0 [ 2972.113533] ip_generic_getfrag+0x173/0x270 [ 2972.113850] ? ip_frag_init+0x350/0x350 [ 2972.114130] ? lock_is_held_type+0xd7/0x130 [ 2972.114443] ? memset+0x20/0x50 [ 2972.114688] raw_getfrag+0x22d/0x290 [ 2972.114950] ? __alloc_skb+0x17b/0x300 [ 2972.115219] __ip_append_data+0x1d7f/0x3aa0 [ 2972.115524] ? raw_destroy+0x30/0x30 [ 2972.115804] ? perf_trace_preemptirq_template+0x274/0x420 [ 2972.116182] ? __ip_finish_output.part.0+0xd10/0xd10 [ 2972.116530] ? lock_is_held_type+0xd7/0x130 [ 2972.116828] ? ipv4_mtu+0x28a/0x380 [ 2972.117083] ? raw_destroy+0x30/0x30 [ 2972.117346] ip_append_data+0x114/0x1a0 [ 2972.117625] raw_sendmsg+0xa97/0x2b80 [ 2972.117910] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 2972.118293] ? __lock_acquire+0x164d/0x5e70 [ 2972.118612] ? raw_recvmsg+0x790/0x790 [ 2972.118899] ? __lock_acquire+0x164d/0x5e70 [ 2972.119234] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 2972.119620] ? __might_fault+0xd1/0x170 [ 2972.119941] ? lock_downgrade+0x6d0/0x6d0 [ 2972.120258] ? selinux_socket_listen+0x2b0/0x2b0 [ 2972.120611] ? mark_lock.part.0+0x2b1f/0x2f70 [ 2972.120962] ? raw_recvmsg+0x790/0x790 [ 2972.121247] inet_sendmsg+0x11d/0x140 [ 2972.121537] ? inet_send_prepare+0x4e0/0x4e0 [ 2972.121871] sock_sendmsg+0x13c/0x190 [ 2972.122153] ____sys_sendmsg+0x744/0x930 [ 2972.122463] ? kernel_sendmsg+0x50/0x50 [ 2972.122758] ? perf_mmap_fault+0x780/0x780 [ 2972.123079] ___sys_sendmsg+0x110/0x1b0 [ 2972.123362] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2972.123704] ? __fget_files+0x24e/0x450 [ 2972.123989] ? lock_downgrade+0x6d0/0x6d0 [ 2972.124299] ? lock_release+0x3b2/0x750 [ 2972.124597] ? ksys_write+0x214/0x250 [ 2972.124883] ? __fget_files+0x270/0x450 [ 2972.125184] ? __fget_light+0xe5/0x280 [ 2972.125477] __sys_sendmsg+0xf3/0x1c0 [ 2972.125761] ? __sys_sendmsg_sock+0x40/0x40 [ 2972.126093] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2972.126456] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2972.126835] do_syscall_64+0x3b/0x90 [ 2972.127104] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2972.127486] RIP: 0033:0x7fe6000ceb19 [ 2972.127738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2972.129039] RSP: 002b:00007fe5fd644188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2972.129535] RAX: ffffffffffffffda RBX: 00007fe6001e1f60 RCX: 00007fe6000ceb19 [ 2972.130006] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 2972.130510] RBP: 00007fe5fd6441d0 R08: 0000000000000000 R09: 0000000000000000 [ 2972.130999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2972.131479] R13: 00007ffef9a5345f R14: 00007fe5fd644300 R15: 0000000000022000 [ 2972.131981] 04:02:34 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x3e8, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:02:34 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 43) 04:02:34 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 23) [ 2972.278244] loop6: detected capacity change from 0 to 4 [ 2972.278703] FAULT_INJECTION: forcing a failure. [ 2972.278703] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2972.279488] CPU: 1 PID: 13568 Comm: syz-executor.6 Not tainted 6.0.0-next-20221014 #1 [ 2972.280018] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2972.280562] Call Trace: [ 2972.280744] [ 2972.280908] dump_stack_lvl+0x8b/0xb3 [ 2972.281184] should_fail.cold+0x5/0xa [ 2972.281460] strncpy_from_user+0x34/0x3e0 [ 2972.281753] getname_flags.part.0+0x95/0x4f0 [ 2972.282071] __x64_sys_mkdir+0xda/0x140 [ 2972.282348] do_syscall_64+0x3b/0x90 [ 2972.282609] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2972.282964] RIP: 0033:0x7fae97d4ac27 [ 2972.283234] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2972.284438] RSP: 002b:00007fae952c0fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2972.284950] RAX: ffffffffffffffda RBX: 0000000020000580 RCX: 00007fae97d4ac27 [ 2972.285430] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2972.285908] RBP: 00007fae952c1040 R08: 0000000000000000 R09: ffffffffffffffff [ 2972.286381] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2972.286856] R13: 0000000020000100 R14: 00007fae952c1000 R15: 0000000020000440 [ 2972.287372] 04:02:48 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 77) 04:02:48 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 24) 04:02:48 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:02:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 44) 04:02:48 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x11, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:02:48 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x600, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:02:48 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 71) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:02:48 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 69) [ 2986.440016] loop6: detected capacity change from 0 to 4 04:02:49 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 25) 04:02:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 45) 04:02:49 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 78) 04:02:49 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0xe00, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:02:49 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() [ 2986.646397] loop6: detected capacity change from 0 to 4 04:02:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 1) 04:02:49 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 70) 04:02:49 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 72) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) [ 2986.672279] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 04:03:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x6000, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:03:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 73) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:03:03 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 71) 04:03:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 46) 04:03:03 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 26) 04:03:03 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 79) 04:03:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 2) 04:03:03 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a78276f553f13758a422a604f3a0b92c7c7437ec0ece54b2ab4396cd630de022276af6c9e7b908a27acc65e1541d1b8d6cb1cf", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() [ 3001.396671] loop0: detected capacity change from 0 to 4 [ 3001.440049] EXT4-fs (loop0): invalid first ino: 0 04:03:04 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 80) [ 3001.465713] FAULT_INJECTION: forcing a failure. [ 3001.465713] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3001.466671] CPU: 0 PID: 13626 Comm: syz-executor.1 Not tainted 6.0.0-next-20221014 #1 [ 3001.467214] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3001.467784] Call Trace: [ 3001.467969] [ 3001.468132] dump_stack_lvl+0x8b/0xb3 [ 3001.468414] should_fail.cold+0x5/0xa [ 3001.468696] _copy_from_user+0x2a/0x170 [ 3001.468994] csum_and_copy_from_iter+0x626/0x1470 [ 3001.469351] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 3001.469673] ? lock_release+0x3b2/0x750 [ 3001.469958] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 3001.470313] ? mark_held_locks+0x9e/0xe0 [ 3001.470617] ip_generic_getfrag+0x173/0x270 [ 3001.470935] ? ip_frag_init+0x350/0x350 [ 3001.471212] ? lock_is_held_type+0xd7/0x130 [ 3001.471524] ? memset+0x20/0x50 [ 3001.471775] raw_getfrag+0x22d/0x290 [ 3001.472042] ? __alloc_skb+0x17b/0x300 [ 3001.472329] __ip_append_data+0x1d7f/0x3aa0 [ 3001.472645] ? raw_destroy+0x30/0x30 [ 3001.472921] ? perf_trace_preemptirq_template+0x274/0x420 [ 3001.473316] ? __ip_finish_output.part.0+0xd10/0xd10 [ 3001.473669] ? lock_is_held_type+0xd7/0x130 [ 3001.473978] ? ipv4_mtu+0x28a/0x380 [ 3001.474243] ? raw_destroy+0x30/0x30 [ 3001.474509] ip_append_data+0x114/0x1a0 [ 3001.474593] loop6: detected capacity change from 0 to 4 [ 3001.474792] raw_sendmsg+0xa97/0x2b80 [ 3001.475839] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 3001.476196] ? __lock_acquire+0x164d/0x5e70 [ 3001.476526] ? raw_recvmsg+0x790/0x790 [ 3001.476811] ? __lock_acquire+0x164d/0x5e70 [ 3001.477130] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 3001.477499] ? __might_fault+0xd1/0x170 [ 3001.477786] ? lock_downgrade+0x6d0/0x6d0 [ 3001.478095] ? selinux_socket_listen+0x2b0/0x2b0 [ 3001.478436] ? mark_lock.part.0+0x2b1f/0x2f70 [ 3001.478773] ? raw_recvmsg+0x790/0x790 [ 3001.479051] inet_sendmsg+0x11d/0x140 [ 3001.479319] ? inet_send_prepare+0x4e0/0x4e0 [ 3001.479634] sock_sendmsg+0x13c/0x190 [ 3001.479906] ____sys_sendmsg+0x744/0x930 [ 3001.480185] ? kernel_sendmsg+0x50/0x50 [ 3001.480481] ? perf_mmap_fault+0x780/0x780 [ 3001.480804] ___sys_sendmsg+0x110/0x1b0 [ 3001.481095] ? __ia32_sys_recvmmsg+0x260/0x260 [ 3001.481431] ? __fget_files+0x24e/0x450 [ 3001.481709] ? lock_downgrade+0x6d0/0x6d0 [ 3001.482009] ? lock_release+0x3b2/0x750 [ 3001.482283] ? ksys_write+0x214/0x250 [ 3001.482567] ? __fget_files+0x270/0x450 [ 3001.482846] ? __fget_light+0xe5/0x280 [ 3001.483129] __sys_sendmsg+0xf3/0x1c0 [ 3001.483398] ? __sys_sendmsg_sock+0x40/0x40 [ 3001.483715] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3001.484066] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3001.484444] do_syscall_64+0x3b/0x90 [ 3001.484703] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3001.485063] RIP: 0033:0x7fe315a89b19 [ 3001.485315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3001.486539] RSP: 002b:00007fe312fff188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3001.487058] RAX: ffffffffffffffda RBX: 00007fe315b9cf60 RCX: 00007fe315a89b19 [ 3001.487550] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 3001.488033] RBP: 00007fe312fff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3001.488535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3001.489011] R13: 00007ffc523f877f R14: 00007fe312fff300 R15: 0000000000022000 [ 3001.489520] 04:03:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 74) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:03:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x6fb9, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:03:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 3) [ 3001.655930] FAULT_INJECTION: forcing a failure. [ 3001.655930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3001.656861] CPU: 0 PID: 13649 Comm: syz-executor.0 Not tainted 6.0.0-next-20221014 #1 [ 3001.657405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3001.657965] Call Trace: [ 3001.658147] [ 3001.658311] dump_stack_lvl+0x8b/0xb3 [ 3001.658584] should_fail.cold+0x5/0xa [ 3001.658868] _copy_from_user+0x2a/0x170 [ 3001.659163] __do_sys_memfd_create+0x103/0x4e0 [ 3001.659489] do_syscall_64+0x3b/0x90 [ 3001.659759] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3001.660129] RIP: 0033:0x7f2d358adb19 [ 3001.660409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3001.661625] RSP: 002b:00007f2d32e22f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3001.662151] RAX: ffffffffffffffda RBX: 0000000020000580 RCX: 00007f2d358adb19 [ 3001.662642] RDX: 0000000000000800 RSI: 0000000000000000 RDI: 00007f2d359070fb [ 3001.663139] RBP: 0000000000000001 R08: 0000000000000400 R09: ffffffffffffffff [ 3001.663636] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 3001.664134] R13: 0000000020000100 R14: 0000000000000800 R15: 0000000020000440 [ 3001.664657] 04:03:19 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={0x0, &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:03:19 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 81) 04:03:19 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 27) 04:03:19 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0xb96f, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:03:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 47) 04:03:19 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 75) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:03:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 4) 04:03:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) [ 3016.919559] loop6: detected capacity change from 0 to 4 [ 3016.943341] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 72) 04:03:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 5) 04:03:19 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 28) [ 3017.008623] FAULT_INJECTION: forcing a failure. [ 3017.008623] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3017.010491] CPU: 0 PID: 13672 Comm: syz-executor.4 Not tainted 6.0.0-next-20221014 #1 [ 3017.011553] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3017.012658] Call Trace: [ 3017.013034] [ 3017.013357] dump_stack_lvl+0x8b/0xb3 [ 3017.013916] should_fail.cold+0x5/0xa [ 3017.014463] _copy_from_user+0x2a/0x170 [ 3017.015071] csum_and_copy_from_iter+0x626/0x1470 [ 3017.015788] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 3017.016434] ? lock_release+0x3b2/0x750 [ 3017.017023] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 3017.017719] ? mark_held_locks+0x9e/0xe0 [ 3017.018296] ip_generic_getfrag+0x173/0x270 [ 3017.018911] ? ip_frag_init+0x350/0x350 [ 3017.019463] ? lock_is_held_type+0xd7/0x130 [ 3017.020082] ? memset+0x20/0x50 [ 3017.020595] raw_getfrag+0x22d/0x290 [ 3017.021118] ? __alloc_skb+0x17b/0x300 [ 3017.021657] __ip_append_data+0x1d7f/0x3aa0 [ 3017.022281] ? raw_destroy+0x30/0x30 [ 3017.022824] ? perf_trace_preemptirq_template+0x274/0x420 [ 3017.023577] ? __ip_finish_output.part.0+0xd10/0xd10 [ 3017.024278] ? lock_is_held_type+0xd7/0x130 [ 3017.024900] ? ipv4_mtu+0x28a/0x380 [ 3017.025416] ? raw_destroy+0x30/0x30 [ 3017.025934] ip_append_data+0x114/0x1a0 [ 3017.026495] raw_sendmsg+0xa97/0x2b80 [ 3017.027038] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 3017.027769] ? __lock_acquire+0x164d/0x5e70 [ 3017.028376] ? raw_recvmsg+0x790/0x790 [ 3017.028964] ? __lock_acquire+0x164d/0x5e70 [ 3017.029580] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 3017.030291] ? __might_fault+0xd1/0x170 [ 3017.030851] ? lock_downgrade+0x6d0/0x6d0 [ 3017.031439] ? selinux_socket_listen+0x2b0/0x2b0 [ 3017.032096] ? mark_lock.part.0+0x2b1f/0x2f70 [ 3017.032787] ? raw_recvmsg+0x790/0x790 [ 3017.033325] inet_sendmsg+0x11d/0x140 [ 3017.033874] ? inet_send_prepare+0x4e0/0x4e0 [ 3017.034490] sock_sendmsg+0x13c/0x190 [ 3017.035030] ____sys_sendmsg+0x744/0x930 [ 3017.035586] ? kernel_sendmsg+0x50/0x50 [ 3017.036141] ? perf_mmap_fault+0x780/0x780 [ 3017.036795] ___sys_sendmsg+0x110/0x1b0 [ 3017.037361] ? __ia32_sys_recvmmsg+0x260/0x260 [ 3017.038047] ? __fget_files+0x24e/0x450 [ 3017.038619] ? lock_downgrade+0x6d0/0x6d0 [ 3017.039202] ? lock_release+0x3b2/0x750 [ 3017.039778] ? ksys_write+0x214/0x250 [ 3017.040351] ? __fget_files+0x270/0x450 [ 3017.041016] ? __fget_light+0xe5/0x280 [ 3017.041576] __sys_sendmsg+0xf3/0x1c0 [ 3017.042129] ? __sys_sendmsg_sock+0x40/0x40 [ 3017.042796] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3017.043525] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3017.044261] do_syscall_64+0x3b/0x90 [ 3017.044814] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3017.045533] RIP: 0033:0x7fe6000ceb19 [ 3017.046063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3017.048516] RSP: 002b:00007fe5fd644188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3017.049548] RAX: ffffffffffffffda RBX: 00007fe6001e1f60 RCX: 00007fe6000ceb19 [ 3017.050515] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 3017.051475] RBP: 00007fe5fd6441d0 R08: 0000000000000000 R09: 0000000000000000 [ 3017.052445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3017.053414] R13: 00007ffef9a5345f R14: 00007fe5fd644300 R15: 0000000000022000 [ 3017.054415] [ 3017.070269] loop0: detected capacity change from 0 to 4 [ 3017.075950] loop6: detected capacity change from 0 to 4 [ 3017.076935] EXT4-fs (loop0): invalid first ino: 0 04:03:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 48) 04:03:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 73) 04:03:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 49) 04:03:19 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={0x0, &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:03:19 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0xe803, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) [ 3017.181788] loop6: detected capacity change from 0 to 4 04:03:19 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 76) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:03:19 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 29) 04:03:19 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 82) [ 3017.194799] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 04:03:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 6) [ 3033.095681] loop6: detected capacity change from 0 to 4 04:03:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 50) 04:03:35 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 77) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:03:35 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 30) 04:03:35 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 74) 04:03:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 7) 04:03:35 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0xf401, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:03:35 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 83) [ 3033.104553] EXT4-fs error (device sda) in __ext4_new_inode:1084: Out of memory 04:03:35 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={0x0, &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() [ 3033.116697] loop0: detected capacity change from 0 to 4 [ 3033.153696] EXT4-fs (loop0): invalid first ino: 0 04:03:35 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 31) 04:03:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 51) 04:03:35 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 78) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:03:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 8) 04:03:35 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x80000, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:03:35 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500), &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() [ 3033.373373] loop6: detected capacity change from 0 to 4 04:03:35 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 84) [ 3033.390875] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 04:03:35 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 75) [ 3033.484007] FAULT_INJECTION: forcing a failure. [ 3033.484007] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3033.485692] CPU: 0 PID: 13745 Comm: syz-executor.4 Not tainted 6.0.0-next-20221014 #1 [ 3033.486637] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3033.487647] Call Trace: [ 3033.487968] [ 3033.488259] dump_stack_lvl+0x8b/0xb3 [ 3033.488770] should_fail.cold+0x5/0xa [ 3033.489283] _copy_from_user+0x2a/0x170 [ 3033.489806] csum_and_copy_from_iter+0x626/0x1470 [ 3033.490440] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 3033.491008] ? lock_release+0x3b2/0x750 [ 3033.491519] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 3033.492140] ? mark_held_locks+0x9e/0xe0 [ 3033.492686] ip_generic_getfrag+0x173/0x270 [ 3033.493241] ? ip_frag_init+0x350/0x350 [ 3033.493768] ? lock_is_held_type+0xd7/0x130 [ 3033.494318] ? memset+0x20/0x50 [ 3033.494758] raw_getfrag+0x22d/0x290 [ 3033.495229] ? __alloc_skb+0x17b/0x300 [ 3033.495738] __ip_append_data+0x1d7f/0x3aa0 [ 3033.496292] ? raw_destroy+0x30/0x30 [ 3033.496795] ? perf_trace_preemptirq_template+0x274/0x420 [ 3033.497489] ? __ip_finish_output.part.0+0xd10/0xd10 [ 3033.498114] ? lock_is_held_type+0xd7/0x130 [ 3033.498656] ? ipv4_mtu+0x28a/0x380 [ 3033.499137] ? raw_destroy+0x30/0x30 [ 3033.499609] ip_append_data+0x114/0x1a0 [ 3033.500127] raw_sendmsg+0xa97/0x2b80 [ 3033.500644] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 3033.501308] ? __lock_acquire+0x164d/0x5e70 [ 3033.501860] ? raw_recvmsg+0x790/0x790 [ 3033.502345] ? __lock_acquire+0x164d/0x5e70 [ 3033.502925] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 3033.503588] ? __might_fault+0xd1/0x170 [ 3033.504095] ? lock_downgrade+0x6d0/0x6d0 [ 3033.504659] ? selinux_socket_listen+0x2b0/0x2b0 [ 3033.505281] ? mark_lock.part.0+0x2b1f/0x2f70 [ 3033.505895] ? raw_recvmsg+0x790/0x790 [ 3033.506394] inet_sendmsg+0x11d/0x140 [ 3033.506900] ? inet_send_prepare+0x4e0/0x4e0 [ 3033.507474] sock_sendmsg+0x13c/0x190 [ 3033.507956] ____sys_sendmsg+0x744/0x930 [ 3033.508480] ? kernel_sendmsg+0x50/0x50 [ 3033.508995] ? perf_mmap_fault+0x780/0x780 [ 3033.509549] ___sys_sendmsg+0x110/0x1b0 [ 3033.510063] ? __ia32_sys_recvmmsg+0x260/0x260 [ 3033.510638] ? __fget_files+0x24e/0x450 [ 3033.511143] ? lock_downgrade+0x6d0/0x6d0 [ 3033.511677] ? lock_release+0x3b2/0x750 [ 3033.512189] ? ksys_write+0x214/0x250 [ 3033.512723] ? __fget_files+0x270/0x450 [ 3033.513244] ? __fget_light+0xe5/0x280 [ 3033.513749] __sys_sendmsg+0xf3/0x1c0 [ 3033.514237] ? __sys_sendmsg_sock+0x40/0x40 [ 3033.514811] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3033.515457] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3033.516103] do_syscall_64+0x3b/0x90 [ 3033.516579] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3033.517239] RIP: 0033:0x7fe6000ceb19 [ 3033.517704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3033.519855] RSP: 002b:00007fe5fd644188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3033.520791] RAX: ffffffffffffffda RBX: 00007fe6001e1f60 RCX: 00007fe6000ceb19 [ 3033.521654] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 3033.522525] RBP: 00007fe5fd6441d0 R08: 0000000000000000 R09: 0000000000000000 [ 3033.523392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3033.524264] R13: 00007ffef9a5345f R14: 00007fe5fd644300 R15: 0000000000022000 [ 3033.525167] 04:03:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 52) 04:03:49 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 79) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:03:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 9) 04:03:49 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 32) 04:03:49 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500), &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:03:49 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x1000000, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:03:49 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 85) 04:03:49 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 76) 04:03:49 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x2000000, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) [ 3047.044333] FAULT_INJECTION: forcing a failure. [ 3047.044333] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3047.045137] CPU: 0 PID: 13765 Comm: syz-executor.3 Not tainted 6.0.0-next-20221014 #1 [ 3047.045622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3047.046186] Call Trace: [ 3047.046369] [ 3047.046530] dump_stack_lvl+0x8b/0xb3 [ 3047.046805] should_fail.cold+0x5/0xa [ 3047.047079] _copy_from_user+0x2a/0x170 [ 3047.047364] csum_and_copy_from_iter+0x626/0x1470 [ 3047.047704] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 3047.048016] ? lock_release+0x3b2/0x750 [ 3047.048296] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 3047.048643] ? mark_held_locks+0x9e/0xe0 [ 3047.048936] ip_generic_getfrag+0x173/0x270 [ 3047.049245] ? ip_frag_init+0x350/0x350 [ 3047.049508] ? lock_is_held_type+0xd7/0x130 [ 3047.049810] ? memset+0x20/0x50 [ 3047.050053] raw_getfrag+0x22d/0x290 [ 3047.050312] ? __alloc_skb+0x17b/0x300 [ 3047.050584] __ip_append_data+0x1d7f/0x3aa0 [ 3047.050891] ? raw_destroy+0x30/0x30 [ 3047.051157] ? perf_trace_preemptirq_template+0x274/0x420 [ 3047.051539] ? __ip_finish_output.part.0+0xd10/0xd10 [ 3047.051883] ? lock_is_held_type+0xd7/0x130 [ 3047.052181] ? ipv4_mtu+0x28a/0x380 [ 3047.052425] ? raw_destroy+0x30/0x30 [ 3047.052686] ip_append_data+0x114/0x1a0 [ 3047.052962] raw_sendmsg+0xa97/0x2b80 [ 3047.053238] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 3047.053600] ? __lock_acquire+0x164d/0x5e70 [ 3047.053902] ? raw_recvmsg+0x790/0x790 [ 3047.054170] ? __lock_acquire+0x164d/0x5e70 [ 3047.054481] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 3047.054839] ? __might_fault+0xd1/0x170 [ 3047.055121] ? lock_downgrade+0x6d0/0x6d0 [ 3047.055421] ? selinux_socket_listen+0x2b0/0x2b0 [ 3047.055749] ? mark_lock.part.0+0x2b1f/0x2f70 [ 3047.055851] loop0: detected capacity change from 0 to 4 [ 3047.056056] ? raw_recvmsg+0x790/0x790 [ 3047.057012] inet_sendmsg+0x11d/0x140 [ 3047.057269] ? inet_send_prepare+0x4e0/0x4e0 [ 3047.057581] sock_sendmsg+0x13c/0x190 [ 3047.057829] ____sys_sendmsg+0x744/0x930 [ 3047.058074] loop6: detected capacity change from 0 to 4 [ 3047.058107] ? kernel_sendmsg+0x50/0x50 [ 3047.059030] ? perf_mmap_fault+0x780/0x780 [ 3047.059316] ___sys_sendmsg+0x110/0x1b0 [ 3047.059599] ? __ia32_sys_recvmmsg+0x260/0x260 [ 3047.059916] ? __fget_files+0x24e/0x450 [ 3047.060196] ? lock_downgrade+0x6d0/0x6d0 [ 3047.060490] ? lock_release+0x3b2/0x750 [ 3047.060768] ? ksys_write+0x214/0x250 [ 3047.061061] ? __fget_files+0x270/0x450 [ 3047.061347] ? __fget_light+0xe5/0x280 [ 3047.061622] __sys_sendmsg+0xf3/0x1c0 [ 3047.061885] ? __sys_sendmsg_sock+0x40/0x40 [ 3047.062178] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3047.062531] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3047.062888] do_syscall_64+0x3b/0x90 [ 3047.063144] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3047.063496] RIP: 0033:0x7f7fa6905b19 [ 3047.063753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3047.064950] RSP: 002b:00007f7fa3e7b188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3047.065452] RAX: ffffffffffffffda RBX: 00007f7fa6a18f60 RCX: 00007f7fa6905b19 [ 3047.065926] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 3047.066400] RBP: 00007f7fa3e7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3047.066867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3047.067339] R13: 00007ffd9216c86f R14: 00007f7fa3e7b300 R15: 0000000000022000 [ 3047.067825] [ 3047.074492] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3047.076722] EXT4-fs (loop0): invalid first ino: 0 04:03:49 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 77) 04:03:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 10) 04:03:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 53) 04:03:49 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 80) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:03:49 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500), &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:03:49 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 33) [ 3047.273114] FAULT_INJECTION: forcing a failure. [ 3047.273114] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3047.274047] CPU: 0 PID: 13783 Comm: syz-executor.4 Not tainted 6.0.0-next-20221014 #1 [ 3047.274571] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3047.275113] Call Trace: [ 3047.275290] [ 3047.275449] dump_stack_lvl+0x8b/0xb3 [ 3047.275718] should_fail.cold+0x5/0xa [ 3047.275993] _copy_from_user+0x2a/0x170 [ 3047.276275] csum_and_copy_from_iter+0x626/0x1470 [ 3047.276617] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 3047.276941] ? lock_release+0x3b2/0x750 [ 3047.277226] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 3047.277573] ? mark_held_locks+0x9e/0xe0 [ 3047.277862] ip_generic_getfrag+0x173/0x270 [ 3047.278168] ? ip_frag_init+0x350/0x350 [ 3047.278449] ? lock_is_held_type+0xd7/0x130 [ 3047.278752] ? memset+0x20/0x50 [ 3047.278994] raw_getfrag+0x22d/0x290 [ 3047.279256] ? __alloc_skb+0x17b/0x300 [ 3047.279531] __ip_append_data+0x1d7f/0x3aa0 [ 3047.279837] ? raw_destroy+0x30/0x30 [ 3047.280101] ? perf_trace_preemptirq_template+0x274/0x420 [ 3047.280482] ? __ip_finish_output.part.0+0xd10/0xd10 [ 3047.280830] ? lock_is_held_type+0xd7/0x130 [ 3047.281132] ? ipv4_mtu+0x28a/0x380 [ 3047.281397] ? raw_destroy+0x30/0x30 [ 3047.281670] ip_append_data+0x114/0x1a0 [ 3047.281957] raw_sendmsg+0xa97/0x2b80 [ 3047.282226] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 3047.282582] ? __lock_acquire+0x164d/0x5e70 [ 3047.282891] ? raw_recvmsg+0x790/0x790 [ 3047.283154] ? __lock_acquire+0x164d/0x5e70 [ 3047.283467] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 3047.283832] ? __might_fault+0xd1/0x170 [ 3047.284111] ? lock_downgrade+0x6d0/0x6d0 [ 3047.284417] ? selinux_socket_listen+0x2b0/0x2b0 [ 3047.284742] ? mark_lock.part.0+0x2b1f/0x2f70 [ 3047.285076] ? raw_recvmsg+0x790/0x790 [ 3047.285345] inet_sendmsg+0x11d/0x140 [ 3047.285616] ? inet_send_prepare+0x4e0/0x4e0 [ 3047.285925] sock_sendmsg+0x13c/0x190 [ 3047.286194] ____sys_sendmsg+0x744/0x930 [ 3047.286473] ? kernel_sendmsg+0x50/0x50 [ 3047.286753] ? perf_mmap_fault+0x780/0x780 [ 3047.287053] ___sys_sendmsg+0x110/0x1b0 [ 3047.287328] ? __ia32_sys_recvmmsg+0x260/0x260 [ 3047.287654] ? __fget_files+0x24e/0x450 [ 3047.287925] ? lock_downgrade+0x6d0/0x6d0 [ 3047.288218] ? lock_release+0x3b2/0x750 [ 3047.288496] ? ksys_write+0x214/0x250 [ 3047.288770] ? __fget_files+0x270/0x450 [ 3047.289072] ? __fget_light+0xe5/0x280 [ 3047.289355] __sys_sendmsg+0xf3/0x1c0 [ 3047.289617] ? __sys_sendmsg_sock+0x40/0x40 [ 3047.289923] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3047.290281] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3047.290632] do_syscall_64+0x3b/0x90 [ 3047.290891] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3047.291244] RIP: 0033:0x7fe6000ceb19 [ 3047.291500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3047.292679] RSP: 002b:00007fe5fd644188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3047.293195] RAX: ffffffffffffffda RBX: 00007fe6001e1f60 RCX: 00007fe6000ceb19 [ 3047.293676] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 3047.294144] RBP: 00007fe5fd6441d0 R08: 0000000000000000 R09: 0000000000000000 [ 3047.294609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3047.295077] R13: 00007ffef9a5345f R14: 00007fe5fd644300 R15: 0000000000022000 [ 3047.295560] [ 3047.339800] loop6: detected capacity change from 0 to 4 [ 3047.357407] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3061.888494] loop6: detected capacity change from 0 to 4 04:04:04 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a782", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:04:04 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 78) 04:04:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 54) 04:04:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 81) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:04:04 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 86) 04:04:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x3000000, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:04:04 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 34) 04:04:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 11) [ 3061.929067] loop0: detected capacity change from 0 to 4 [ 3061.932041] EXT4-fs (loop0): invalid first ino: 0 04:04:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 55) [ 3062.033027] loop6: detected capacity change from 0 to 4 04:04:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 12) 04:04:04 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 87) [ 3062.068399] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) 04:04:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c009000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x4000000, 0x8, {r3, @remote, @broadcast}}}], 0x20}, 0x0) 04:04:04 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 79) 04:04:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 82) open(&(0x7f0000000080)='./file1\x00', 0xc00, 0x0) 04:04:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028", 0x5d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 56) 04:04:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001", 0x4d, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) (fail_nth: 13) [ 3062.322580] FAULT_INJECTION: forcing a failure. [ 3062.322580] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3062.324424] CPU: 1 PID: 13834 Comm: syz-executor.4 Not tainted 6.0.0-next-20221014 #1 [ 3062.325341] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3062.326285] Call Trace: [ 3062.326601] [ 3062.326885] dump_stack_lvl+0x8b/0xb3 [ 3062.327355] should_fail.cold+0x5/0xa [ 3062.327838] _copy_from_user+0x2a/0x170 [ 3062.328332] csum_and_copy_from_iter+0x626/0x1470 [ 3062.328921] ? _copy_mc_to_iter+0x13c0/0x13c0 [ 3062.329642] ? lock_release+0x3b2/0x750 [ 3062.330136] ? __kmem_cache_alloc_node+0x22f/0x3d0 [ 3062.330931] ? mark_held_locks+0x9e/0xe0 [ 3062.331440] ip_generic_getfrag+0x173/0x270 [ 3062.332144] ? ip_frag_init+0x350/0x350 [ 3062.332667] ? lock_is_held_type+0xd7/0x130 [ 3062.333288] ? memset+0x20/0x50 [ 3062.333743] raw_getfrag+0x22d/0x290 [ 3062.334324] ? __alloc_skb+0x17b/0x300 [ 3062.334811] __ip_append_data+0x1d7f/0x3aa0 [ 3062.335490] ? raw_destroy+0x30/0x30 [ 3062.335976] ? perf_trace_preemptirq_template+0x274/0x420 [ 3062.336856] ? __ip_finish_output.part.0+0xd10/0xd10 [ 3062.337515] ? lock_is_held_type+0xd7/0x130 [ 3062.338214] ? ipv4_mtu+0x28a/0x380 [ 3062.338697] ? raw_destroy+0x30/0x30 [ 3062.339295] ip_append_data+0x114/0x1a0 [ 3062.339811] raw_sendmsg+0xa97/0x2b80 [ 3062.340426] ? lockdep_hardirqs_on_prepare+0x360/0x410 [ 3062.341092] ? __lock_acquire+0x164d/0x5e70 [ 3062.341797] ? raw_recvmsg+0x790/0x790 [ 3062.342310] ? __lock_acquire+0x164d/0x5e70 [ 3062.342890] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 3062.343713] ? __might_fault+0xd1/0x170 [ 3062.344239] ? lock_downgrade+0x6d0/0x6d0 [ 3062.344787] ? selinux_socket_listen+0x2b0/0x2b0 [ 3062.345562] ? mark_lock.part.0+0x2b1f/0x2f70 [ 3062.346168] ? raw_recvmsg+0x790/0x790 [ 3062.346780] inet_sendmsg+0x11d/0x140 [ 3062.347291] ? inet_send_prepare+0x4e0/0x4e0 [ 3062.348004] sock_sendmsg+0x13c/0x190 [ 3062.348499] ____sys_sendmsg+0x744/0x930 [ 3062.349166] ? kernel_sendmsg+0x50/0x50 [ 3062.349680] ? perf_mmap_fault+0x780/0x780 [ 3062.350374] ___sys_sendmsg+0x110/0x1b0 [ 3062.350880] ? __ia32_sys_recvmmsg+0x260/0x260 [ 3062.351623] ? __fget_files+0x24e/0x450 [ 3062.352143] ? lock_downgrade+0x6d0/0x6d0 [ 3062.352808] ? lock_release+0x3b2/0x750 [ 3062.353348] ? ksys_write+0x214/0x250 [ 3062.353982] ? __fget_files+0x270/0x450 [ 3062.354511] ? __fget_light+0xe5/0x280 [ 3062.355018] __sys_sendmsg+0xf3/0x1c0 [ 3062.355509] ? __sys_sendmsg_sock+0x40/0x40 [ 3062.356078] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3062.356734] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3062.357413] do_syscall_64+0x3b/0x90 [ 3062.357882] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3062.358529] RIP: 0033:0x7fe6000ceb19 [ 3062.358993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3062.361791] RSP: 002b:00007fe5fd644188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3062.362724] RAX: ffffffffffffffda RBX: 00007fe6001e1f60 RCX: 00007fe6000ceb19 [ 3062.363605] RDX: 0000000000000000 RSI: 0000000020000780 RDI: 0000000000000006 [ 3062.364462] RBP: 00007fe5fd6441d0 R08: 0000000000000000 R09: 0000000000000000 [ 3062.365345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3062.366167] R13: 00007ffef9a5345f R14: 00007fe5fd644300 R15: 0000000000022000 [ 3062.367059] 04:04:04 executing program 7: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffdef) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0xb, 0x0, @thr={&(0x7f0000001500)="18ff8ab69fe079c8b5b5e95cd5b3ceb2c3ba4f1eb41775ae27bce5c809cad555d17f699f173eec22eb0b62af84bc3199a782", &(0x7f0000001580)="7ad4eb7093e7e9893ea5f96e11eba6d01c25f7c08897343b8a3e9d16eb5fd0cbe269af49543dd9478b1df798ad82823d9100af85f945fa1b18d5a0f23add35dbb30f67147441821d189ebcb4da0a48087db274bcebb3d612370bfccac341e3e916dc71"}}) fork() 04:04:04 executing program 2: r0 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0xa554, 0x7, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000001600)='./file0\x00', 0x0, 0x7) ioctl$int_in(r2, 0x5421, &(0x7f0000001640)=0xffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000500)={{}, r1, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)=ANY=[@ANYBLOB="0200b5009ebfd162aeb6b2b946f1d86971e936645bc9101120788ada944916095ed7e4d045ebe7a296eb4b5a858d92b63224a8225be948656f0a8a5c84ee11363cbfe28c6932ac1cfdd864edf14467b61ddbffd0eab7e3237f68f183b3fb5ff68a966f7c248f7f195a693a7ecb592715c261a5613da0a2121cde043240e63fab8f9b1ef51fc1b2d7d4ae57e9036cacecf008468aa7a5d8eff801d10cec5bc18e34c59e711dbeebbbd85f7fa87db0a22d44cfecf8ab6743adb72045"]) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000002600), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x59b) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x7}, 0x8550, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x862a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000100)="791b7d2577ec32834a9a9aafee0def956e242de950d5fb727f8252a2dc6dddf0b7989216f868d4bb30764ab9b8b02c", 0x2f, 0x59, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x810, 0xffffffffffffffff, 0x0) fork() (fail_nth: 35) 04:04:04 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="46efffff000000002e2f66696c653000"]) openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)={0x67, 0x3, &(0x7f00000007c0)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000004c0)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000400)=0x4) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="94800000865d08d99c87d87a10df6e19ecb558c3122ffa7b1022356422ebe9bc783207e54ca30104c3d9afda4439926da04209da24dc26b4f8a8be61a25848fcd601775481de68279ba9", @ANYRES16=0x0, @ANYBLOB="000427bd7000fbdbdf25460000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00010000000c008f009b000000000000000c009000b7000000000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008e00020000000c008f0009000000000000000c0090000200000000000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x91) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000140)={0x1, 'team0\x00', {}, 0x465}) open(0x0, 0x0, 0x48) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0x0) (fail_nth: 80) [ 3062.414445] loop6: detected capacity change from 0 to 4 [ 3062.445012] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3062.462720] loop0: detected capacity change from 0 to 4 [ 3062.480340] EXT4-fs (loop0): invalid first ino: 0 [ 3063.431755] ================================================================== [ 3063.432738] BUG: KASAN: use-after-free in __lock_acquire+0x42c9/0x5e70 [ 3063.433399] Read of size 8 at addr ffff888043b0b968 by task syz-executor/13850 [ 3063.434313] [ 3063.434539] CPU: 1 PID: 13850 Comm: syz-executor Not tainted 6.0.0-next-20221014 #1 [ 3063.435527] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3063.436600] Call Trace: [ 3063.436944] [ 3063.437261] dump_stack_lvl+0x8b/0xb3 [ 3063.437771] print_report+0x172/0x475 [ 3063.438275] ? __lock_acquire+0x42c9/0x5e70 [ 3063.438840] kasan_report+0xbb/0x1c0 [ 3063.439329] ? __lock_acquire+0x42c9/0x5e70 [ 3063.439898] __lock_acquire+0x42c9/0x5e70 [ 3063.440448] ? lock_chain_count+0x20/0x20 [ 3063.440991] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 3063.441701] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 3063.442383] ? finish_task_switch.isra.0+0x22d/0x8a0 [ 3063.443050] lock_acquire+0x1a2/0x530 [ 3063.443542] ? kmemleak_scan+0x21d/0x16d0 [ 3063.444072] ? lock_release+0x750/0x750 [ 3063.444596] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3063.445235] ? trace_rcu_dyntick+0x1a7/0x250 [ 3063.446401] ? ct_nmi_exit+0x119/0x1c0 [ 3063.447179] _raw_spin_lock_irq+0x32/0x50 [ 3063.448404] ? kmemleak_scan+0x21d/0x16d0 [ 3063.449244] kmemleak_scan+0x21d/0x16d0 [ 3063.450042] ? paint_ptr+0xc0/0xc0 [ 3063.450386] ? strncpy_from_user+0x204/0x3e0 [ 3063.450826] kmemleak_write+0x570/0x680 [ 3063.451210] ? kmemleak_scan+0x16d0/0x16d0 [ 3063.451613] ? debugfs_file_get+0x1ce/0x450 [ 3063.452022] ? debugfs_file_put+0xd0/0xd0 [ 3063.452412] full_proxy_write+0x11d/0x190 [ 3063.452816] vfs_write+0x2cb/0xd90 [ 3063.453182] ? full_proxy_poll+0x180/0x180 [ 3063.453579] ? kernel_write+0x630/0x630 [ 3063.453987] ? lock_release+0x3b2/0x750 [ 3063.454370] ? syscall_enter_from_user_mode+0x18/0x50 [ 3063.454866] ? perf_trace_preemptirq_template+0xa2/0x420 [ 3063.455378] ? __fget_light+0x212/0x280 [ 3063.455773] ksys_write+0x127/0x250 [ 3063.456125] ? __ia32_sys_read+0xb0/0xb0 [ 3063.456509] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3063.457002] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3063.457496] do_syscall_64+0x3b/0x90 [ 3063.457880] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3063.458359] RIP: 0033:0x7f77ec4aa5c3 [ 3063.458719] Code: 16 00 00 00 eb ae 90 b8 6e 00 00 00 eb a6 e8 44 ef 04 00 0f 1f 40 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 3063.460343] RSP: 002b:00007fffdc237398 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3063.461051] RAX: ffffffffffffffda RBX: 00007fffdc2379d8 RCX: 00007f77ec4aa5c3 [ 3063.461704] RDX: 0000000000000004 RSI: 00007f77ec560ed9 RDI: 0000000000000003 [ 3063.462339] RBP: 0000000000000002 R08: 0000000000000bf6 R09: 00007fffdc389080 [ 3063.463001] R10: 00007fffdc389090 R11: 0000000000000246 R12: 00000000fffffff6 [ 3063.463651] R13: 00007fffdc238ef1 R14: 0000000000000000 R15: 00000000002ebb2d [ 3063.464299] [ 3063.464519] [ 3063.464702] Allocated by task 127: [ 3063.465039] kasan_save_stack+0x1e/0x40 [ 3063.465417] kasan_set_track+0x21/0x30 [ 3063.465792] __kasan_slab_alloc+0x58/0x70 [ 3063.466183] kmem_cache_alloc+0x1a9/0x3e0 [ 3063.466569] __create_object+0x3d/0xc10 [ 3063.466964] kmem_cache_alloc+0x235/0x3e0 [ 3063.467350] __alloc_file+0x21/0x240 [ 3063.467718] alloc_empty_file+0x6d/0x170 [ 3063.468102] path_openat+0xd4/0x27b0 [ 3063.468450] do_filp_open+0x1b6/0x410 [ 3063.468820] do_sys_openat2+0x171/0x4c0 [ 3063.469214] __x64_sys_openat+0x13f/0x1f0 [ 3063.469601] do_syscall_64+0x3b/0x90 [ 3063.469962] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3063.470438] [ 3063.470609] Freed by task 127: [ 3063.470920] kasan_save_stack+0x1e/0x40 [ 3063.471292] kasan_set_track+0x21/0x30 [ 3063.471685] kasan_save_free_info+0x2a/0x50 [ 3063.472089] __kasan_slab_free+0x106/0x190 [ 3063.472479] kmem_cache_free+0xf7/0x610 [ 3063.472856] rcu_core+0x7e2/0x2080 [ 3063.473210] __do_softirq+0x1c3/0x8f5 [ 3063.473568] [ 3063.473746] Last potentially related work creation: [ 3063.474184] kasan_save_stack+0x1e/0x40 [ 3063.474557] __kasan_record_aux_stack+0x95/0xb0 [ 3063.475000] call_rcu+0x6a/0xa30 [ 3063.475318] kmem_cache_free+0xbd/0x610 [ 3063.475713] rcu_core+0x7e2/0x2080 [ 3063.476052] __do_softirq+0x1c3/0x8f5 [ 3063.476412] [ 3063.476574] Second to last potentially related work creation: [ 3063.477104] kasan_save_stack+0x1e/0x40 [ 3063.477474] __kasan_record_aux_stack+0x95/0xb0 [ 3063.477917] call_rcu+0x6a/0xa30 [ 3063.478234] kmem_cache_free+0xbd/0x610 [ 3063.478597] rcu_core+0x7e2/0x2080 [ 3063.478960] __do_softirq+0x1c3/0x8f5 [ 3063.479318] [ 3063.479481] The buggy address belongs to the object at ffff888043b0b950 [ 3063.479481] which belongs to the cache kmemleak_object of size 368 [ 3063.480661] The buggy address is located 24 bytes inside of [ 3063.480661] 368-byte region [ffff888043b0b950, ffff888043b0bac0) [ 3063.481780] [ 3063.481952] The buggy address belongs to the physical page: [ 3063.482482] page:0000000099fc01be refcount:1 mapcount:0 mapping:0000000000000000 index:0xffffea00005d6da0 pfn:0x43b0a [ 3063.483502] head:0000000099fc01be order:1 compound_mapcount:0 compound_pincount:0 [ 3063.484234] flags: 0x100000000010200(slab|head|node=0|zone=1) [ 3063.484817] raw: 0100000000010200 ffff888007c4f780 dead00000012000f ffff888043b0a6c0 [ 3063.485573] raw: ffffea00005d6da0 ffffea0000385020 00000001ffffffff 0000000000000000 [ 3063.486308] page dumped because: kasan: bad access detected [ 3063.486853] [ 3063.487025] Memory state around the buggy address: [ 3063.487510] ffff888043b0b800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3063.488204] ffff888043b0b880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3063.488900] >ffff888043b0b900: fb fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb [ 3063.489591] ^ [ 3063.490220] ffff888043b0b980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3063.490903] ffff888043b0ba00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3063.491583] ================================================================== [ 3063.492274] Disabling lock debugging due to kernel taint VM DIAGNOSIS: 04:04:06 Registers: info registers vcpu 0 RAX=00000000445efa00 RBX=00007fd51762b3a6 RCX=0000000000000000 RDX=ffff8880441d9ac0 RSI=00007fd51762b3a6 RDI=ffffffff8544db60 RBP=00007fd51762b3a6 RSP=ffff8880445ef958 R8 =0000000000000005 R9 =0000000000000000 R10=0000000080000000 R11=000000000003603d R12=ffff8880445efa80 R13=0000000000000000 R14=ffff8880441d9ac0 R15=ffff88800843f280 RIP=ffffffff81469896 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fd51717c8c0 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffc8556dc18 CR3=000000003d6b8000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=ff0000000000ff00000000ff000000ff XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=ffffffffffff00000000000000000000 XMM06=00000000000065616124242f6867632f XMM07=00000000000000000000000000000000 XMM08=2064616572206f742064656c69614600 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000034 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823c1fc1 RDI=ffffffff8765e9e0 RBP=ffffffff8765e9a0 RSP=ffff888032f07248 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000034 R11=0000000000000001 R12=0000000000000034 R13=ffffffff8765e9a0 R14=0000000000000010 R15=ffffffff823c1fb0 RIP=ffffffff823c2019 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555556720400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffc8556dc18 CR3=0000000044406000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffff000000070000561712e72c90 XMM02=ffffff0f0e0d0c0b0a09080706050403 XMM03=696e656420737365636341002f737973 XMM04=323d44455a494c414954494e495f4345 XMM05=3d5145534b534944006b7369643d4550 XMM06=3d454d414e56454400303d444955555f XMM07=59534255530031706f6f6c2f6b636f6c XMM08=49006d756e203c2069000a313a56000a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000