syzkaller login: [ 41.881351] sshd (244) used greatest stack depth: 24328 bytes left Warning: Permanently added '[localhost]:25180' (ECDSA) to the list of known hosts. 2022/09/16 12:48:12 fuzzer started 2022/09/16 12:48:13 dialing manager at localhost:36051 [ 44.104603] cgroup: Unknown subsys name 'net' [ 44.268379] cgroup: Unknown subsys name 'rlimit' 2022/09/16 12:48:26 syscalls: 2215 2022/09/16 12:48:26 code coverage: enabled 2022/09/16 12:48:26 comparison tracing: enabled 2022/09/16 12:48:26 extra coverage: enabled 2022/09/16 12:48:26 setuid sandbox: enabled 2022/09/16 12:48:26 namespace sandbox: enabled 2022/09/16 12:48:26 Android sandbox: enabled 2022/09/16 12:48:26 fault injection: enabled 2022/09/16 12:48:26 leak checking: enabled 2022/09/16 12:48:26 net packet injection: enabled 2022/09/16 12:48:26 net device setup: enabled 2022/09/16 12:48:26 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/16 12:48:26 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/16 12:48:26 USB emulation: enabled 2022/09/16 12:48:26 hci packet injection: enabled 2022/09/16 12:48:26 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220916) 2022/09/16 12:48:26 802.15.4 emulation: enabled 2022/09/16 12:48:26 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/16 12:48:26 fetching corpus: 50, signal 31005/34437 (executing program) 2022/09/16 12:48:26 fetching corpus: 100, signal 42392/47203 (executing program) 2022/09/16 12:48:27 fetching corpus: 150, signal 50103/56256 (executing program) 2022/09/16 12:48:27 fetching corpus: 200, signal 59984/67265 (executing program) 2022/09/16 12:48:27 fetching corpus: 250, signal 68289/76553 (executing program) 2022/09/16 12:48:27 fetching corpus: 300, signal 72506/81892 (executing program) 2022/09/16 12:48:27 fetching corpus: 350, signal 76229/86749 (executing program) 2022/09/16 12:48:27 fetching corpus: 400, signal 80913/92354 (executing program) 2022/09/16 12:48:27 fetching corpus: 450, signal 87440/99566 (executing program) 2022/09/16 12:48:28 fetching corpus: 500, signal 90859/103881 (executing program) 2022/09/16 12:48:28 fetching corpus: 550, signal 93764/107705 (executing program) 2022/09/16 12:48:28 fetching corpus: 600, signal 97305/111949 (executing program) 2022/09/16 12:48:28 fetching corpus: 650, signal 101175/116492 (executing program) 2022/09/16 12:48:28 fetching corpus: 700, signal 104390/120388 (executing program) 2022/09/16 12:48:28 fetching corpus: 750, signal 107650/124247 (executing program) 2022/09/16 12:48:28 fetching corpus: 800, signal 109958/127229 (executing program) 2022/09/16 12:48:29 fetching corpus: 850, signal 112797/130634 (executing program) 2022/09/16 12:48:29 fetching corpus: 900, signal 115434/133849 (executing program) 2022/09/16 12:48:29 fetching corpus: 950, signal 118437/137284 (executing program) 2022/09/16 12:48:29 fetching corpus: 1000, signal 121002/140303 (executing program) 2022/09/16 12:48:29 fetching corpus: 1050, signal 124069/143740 (executing program) 2022/09/16 12:48:29 fetching corpus: 1100, signal 125170/145541 (executing program) 2022/09/16 12:48:29 fetching corpus: 1150, signal 128101/148803 (executing program) 2022/09/16 12:48:30 fetching corpus: 1200, signal 130673/151655 (executing program) 2022/09/16 12:48:30 fetching corpus: 1250, signal 131924/153468 (executing program) 2022/09/16 12:48:30 fetching corpus: 1300, signal 134037/155923 (executing program) 2022/09/16 12:48:30 fetching corpus: 1350, signal 136306/158394 (executing program) 2022/09/16 12:48:30 fetching corpus: 1400, signal 138421/160776 (executing program) 2022/09/16 12:48:30 fetching corpus: 1450, signal 140292/162914 (executing program) 2022/09/16 12:48:30 fetching corpus: 1500, signal 141213/164334 (executing program) 2022/09/16 12:48:31 fetching corpus: 1550, signal 143001/166397 (executing program) 2022/09/16 12:48:31 fetching corpus: 1600, signal 144218/168072 (executing program) 2022/09/16 12:48:31 fetching corpus: 1650, signal 146687/170580 (executing program) 2022/09/16 12:48:31 fetching corpus: 1700, signal 149078/172958 (executing program) 2022/09/16 12:48:31 fetching corpus: 1750, signal 150886/174832 (executing program) 2022/09/16 12:48:31 fetching corpus: 1800, signal 152067/176269 (executing program) 2022/09/16 12:48:31 fetching corpus: 1850, signal 153794/178010 (executing program) 2022/09/16 12:48:31 fetching corpus: 1900, signal 155478/179749 (executing program) 2022/09/16 12:48:32 fetching corpus: 1950, signal 157148/181460 (executing program) 2022/09/16 12:48:32 fetching corpus: 2000, signal 158247/182747 (executing program) 2022/09/16 12:48:32 fetching corpus: 2050, signal 159841/184343 (executing program) 2022/09/16 12:48:32 fetching corpus: 2100, signal 161436/185933 (executing program) 2022/09/16 12:48:32 fetching corpus: 2150, signal 162728/187300 (executing program) 2022/09/16 12:48:32 fetching corpus: 2200, signal 163809/188445 (executing program) 2022/09/16 12:48:32 fetching corpus: 2250, signal 165048/189740 (executing program) 2022/09/16 12:48:33 fetching corpus: 2300, signal 165836/190714 (executing program) 2022/09/16 12:48:33 fetching corpus: 2350, signal 167194/191989 (executing program) 2022/09/16 12:48:33 fetching corpus: 2400, signal 168196/193014 (executing program) 2022/09/16 12:48:33 fetching corpus: 2450, signal 168891/193923 (executing program) 2022/09/16 12:48:33 fetching corpus: 2500, signal 169991/194980 (executing program) 2022/09/16 12:48:33 fetching corpus: 2550, signal 170967/195994 (executing program) 2022/09/16 12:48:33 fetching corpus: 2600, signal 172588/197310 (executing program) 2022/09/16 12:48:33 fetching corpus: 2650, signal 173396/198228 (executing program) 2022/09/16 12:48:34 fetching corpus: 2700, signal 174400/199181 (executing program) 2022/09/16 12:48:34 fetching corpus: 2750, signal 175085/199951 (executing program) 2022/09/16 12:48:34 fetching corpus: 2800, signal 176106/200901 (executing program) 2022/09/16 12:48:34 fetching corpus: 2850, signal 177330/201893 (executing program) 2022/09/16 12:48:34 fetching corpus: 2900, signal 178603/202940 (executing program) 2022/09/16 12:48:34 fetching corpus: 2950, signal 179609/203828 (executing program) 2022/09/16 12:48:34 fetching corpus: 3000, signal 180989/204844 (executing program) 2022/09/16 12:48:35 fetching corpus: 3050, signal 181764/205581 (executing program) 2022/09/16 12:48:35 fetching corpus: 3100, signal 182905/206513 (executing program) 2022/09/16 12:48:35 fetching corpus: 3150, signal 183806/207267 (executing program) 2022/09/16 12:48:35 fetching corpus: 3200, signal 184680/208050 (executing program) 2022/09/16 12:48:35 fetching corpus: 3250, signal 186006/209067 (executing program) 2022/09/16 12:48:35 fetching corpus: 3300, signal 187347/209896 (executing program) 2022/09/16 12:48:35 fetching corpus: 3350, signal 188210/210610 (executing program) 2022/09/16 12:48:36 fetching corpus: 3400, signal 189276/211336 (executing program) 2022/09/16 12:48:36 fetching corpus: 3450, signal 190319/212096 (executing program) 2022/09/16 12:48:36 fetching corpus: 3500, signal 190954/212665 (executing program) 2022/09/16 12:48:36 fetching corpus: 3550, signal 192109/213391 (executing program) 2022/09/16 12:48:36 fetching corpus: 3600, signal 193095/214016 (executing program) 2022/09/16 12:48:36 fetching corpus: 3650, signal 194148/214707 (executing program) 2022/09/16 12:48:36 fetching corpus: 3700, signal 194830/215183 (executing program) 2022/09/16 12:48:37 fetching corpus: 3750, signal 195899/215800 (executing program) 2022/09/16 12:48:37 fetching corpus: 3800, signal 196458/216220 (executing program) 2022/09/16 12:48:37 fetching corpus: 3850, signal 197116/216655 (executing program) 2022/09/16 12:48:37 fetching corpus: 3900, signal 198174/217270 (executing program) 2022/09/16 12:48:37 fetching corpus: 3950, signal 199114/217789 (executing program) 2022/09/16 12:48:37 fetching corpus: 4000, signal 199683/218159 (executing program) 2022/09/16 12:48:37 fetching corpus: 4050, signal 200710/218603 (executing program) 2022/09/16 12:48:38 fetching corpus: 4100, signal 201634/219046 (executing program) 2022/09/16 12:48:38 fetching corpus: 4150, signal 202807/219535 (executing program) 2022/09/16 12:48:38 fetching corpus: 4200, signal 204265/220113 (executing program) 2022/09/16 12:48:38 fetching corpus: 4250, signal 204977/220464 (executing program) 2022/09/16 12:48:38 fetching corpus: 4300, signal 205686/220808 (executing program) 2022/09/16 12:48:38 fetching corpus: 4350, signal 206120/221111 (executing program) 2022/09/16 12:48:38 fetching corpus: 4400, signal 206656/221397 (executing program) 2022/09/16 12:48:38 fetching corpus: 4450, signal 207065/221691 (executing program) 2022/09/16 12:48:39 fetching corpus: 4500, signal 207859/222082 (executing program) 2022/09/16 12:48:39 fetching corpus: 4550, signal 209254/222513 (executing program) 2022/09/16 12:48:39 fetching corpus: 4600, signal 209646/222713 (executing program) 2022/09/16 12:48:39 fetching corpus: 4650, signal 210438/222983 (executing program) 2022/09/16 12:48:39 fetching corpus: 4700, signal 211456/223283 (executing program) 2022/09/16 12:48:39 fetching corpus: 4750, signal 212024/223472 (executing program) 2022/09/16 12:48:39 fetching corpus: 4800, signal 212812/223738 (executing program) 2022/09/16 12:48:40 fetching corpus: 4850, signal 213379/223923 (executing program) 2022/09/16 12:48:40 fetching corpus: 4900, signal 213993/224195 (executing program) 2022/09/16 12:48:40 fetching corpus: 4950, signal 214586/224337 (executing program) 2022/09/16 12:48:40 fetching corpus: 5000, signal 215226/224479 (executing program) 2022/09/16 12:48:40 fetching corpus: 5050, signal 215634/224612 (executing program) 2022/09/16 12:48:40 fetching corpus: 5100, signal 216136/224731 (executing program) 2022/09/16 12:48:40 fetching corpus: 5150, signal 216909/224857 (executing program) 2022/09/16 12:48:41 fetching corpus: 5200, signal 217476/224968 (executing program) 2022/09/16 12:48:41 fetching corpus: 5250, signal 218098/225090 (executing program) 2022/09/16 12:48:41 fetching corpus: 5299, signal 218643/225181 (executing program) 2022/09/16 12:48:41 fetching corpus: 5299, signal 218643/225239 (executing program) 2022/09/16 12:48:41 fetching corpus: 5299, signal 218643/225308 (executing program) 2022/09/16 12:48:41 fetching corpus: 5299, signal 218643/225324 (executing program) 2022/09/16 12:48:41 fetching corpus: 5299, signal 218643/225324 (executing program) 2022/09/16 12:48:44 starting 8 fuzzer processes 12:48:44 executing program 0: syz_emit_ethernet(0x8a, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010100, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@generic={0x2, 0xf, "bdbe3c6af51c4143e23450af61"}, @exp_fastopen={0xfe, 0x5, 0xf989, "f6"}, @generic={0x0, 0x9, "fa2eb6ab35ecb5"}, @exp_smc={0xfe, 0x6}, @nop, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @mss={0x2, 0x4}, @exp_fastopen={0xfe, 0x7, 0xf989, "7db37a"}]}}}}}}}, 0x0) 12:48:44 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$netlink(r0, 0x10e, 0xa, 0x0, &(0x7f0000001080)) 12:48:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000004880)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10, &(0x7f0000001340)=[{0x0}, {&(0x7f0000000140)='k', 0x1}, {&(0x7f0000000200)='GA}', 0x3}, {&(0x7f0000001280)="19", 0x1}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x2, 0x800) 12:48:44 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) read(r1, &(0x7f00000004c0)=""/195, 0xc3) 12:48:44 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000140)=ANY=[]) 12:48:44 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xee) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) fsetxattr$security_ima(r0, &(0x7f0000000080), &(0x7f00000000c0)=@sha1={0x1, "1f95a1bfeb777dbe280223dd92fc1d37dae377f1"}, 0x15, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x0, 0xca5, 0x0, 0x4}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00000001c0)=""/215, &(0x7f00000002c0)=0xd7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000440)={&(0x7f0000000340), 0xc, 0x0}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000540)={0x0, @isdn={0x22, 0x20, 0x0, 0x0, 0x40}, @xdp={0x2c, 0x2, 0x0, 0x12}, @can, 0x4, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000500)='veth0_virt_wifi\x00', 0x0, 0x0, 0x200}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000005c0)) accept$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000640)=0x14) [ 75.265094] audit: type=1400 audit(1663332524.417:6): avc: denied { execmem } for pid=289 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 12:48:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x1000) 12:48:44 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x8cffffff}}]}) [ 76.460272] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 76.462707] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 76.464556] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 76.468566] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 76.471717] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 76.475890] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 76.481635] Bluetooth: hci0: HCI_REQ-0x0c1a [ 76.644879] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 76.648164] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 76.649452] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 76.654134] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 76.656411] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 76.657903] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 76.660030] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 76.662232] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 76.662622] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 76.668137] Bluetooth: hci2: HCI_REQ-0x0c1a [ 76.668590] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 76.671188] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 76.672712] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 76.674629] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 76.677625] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 76.679527] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 76.682010] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 76.685322] Bluetooth: hci3: HCI_REQ-0x0c1a [ 76.714698] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 76.717396] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 76.718632] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 76.721504] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 76.723651] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 76.724966] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 76.729305] Bluetooth: hci5: HCI_REQ-0x0c1a [ 76.750025] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 76.764423] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 76.770506] Bluetooth: hci4: HCI_REQ-0x0c1a [ 76.861425] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 76.864061] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 76.867960] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 76.876122] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 76.881116] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 76.890669] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 76.904624] Bluetooth: hci7: HCI_REQ-0x0c1a [ 78.545496] Bluetooth: hci0: command 0x0409 tx timeout [ 78.608907] Bluetooth: hci1: Opcode 0x c03 failed: -110 [ 78.736883] Bluetooth: hci3: command 0x0409 tx timeout [ 78.737388] Bluetooth: hci2: command 0x0409 tx timeout [ 78.737919] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 78.800894] Bluetooth: hci4: command 0x0409 tx timeout [ 78.801327] Bluetooth: hci5: command 0x0409 tx timeout [ 78.928866] Bluetooth: hci7: command 0x0409 tx timeout [ 80.593476] Bluetooth: hci0: command 0x041b tx timeout [ 80.784952] Bluetooth: hci2: command 0x041b tx timeout [ 80.786036] Bluetooth: hci3: command 0x041b tx timeout [ 80.849989] Bluetooth: hci5: command 0x041b tx timeout [ 80.850511] Bluetooth: hci4: command 0x041b tx timeout [ 80.976920] Bluetooth: hci7: command 0x041b tx timeout [ 81.969210] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 81.974196] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 81.977246] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 81.982455] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 81.986049] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 81.987474] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 81.992784] Bluetooth: hci1: HCI_REQ-0x0c1a [ 82.073572] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 82.078234] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 82.081269] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 82.086233] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 82.092912] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 82.095162] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 82.104705] Bluetooth: hci6: HCI_REQ-0x0c1a [ 82.640916] Bluetooth: hci0: command 0x040f tx timeout [ 82.832923] Bluetooth: hci3: command 0x040f tx timeout [ 82.833761] Bluetooth: hci2: command 0x040f tx timeout [ 82.896979] Bluetooth: hci4: command 0x040f tx timeout [ 82.897791] Bluetooth: hci5: command 0x040f tx timeout [ 83.024912] Bluetooth: hci7: command 0x040f tx timeout [ 84.048923] Bluetooth: hci1: command 0x0409 tx timeout [ 84.176916] Bluetooth: hci6: command 0x0409 tx timeout [ 84.688883] Bluetooth: hci0: command 0x0419 tx timeout [ 84.880940] Bluetooth: hci2: command 0x0419 tx timeout [ 84.881439] Bluetooth: hci3: command 0x0419 tx timeout [ 84.944998] Bluetooth: hci5: command 0x0419 tx timeout [ 84.945492] Bluetooth: hci4: command 0x0419 tx timeout [ 85.072877] Bluetooth: hci7: command 0x0419 tx timeout [ 86.097325] Bluetooth: hci1: command 0x041b tx timeout [ 86.224885] Bluetooth: hci6: command 0x041b tx timeout [ 88.144951] Bluetooth: hci1: command 0x040f tx timeout [ 88.272928] Bluetooth: hci6: command 0x040f tx timeout [ 90.193435] Bluetooth: hci1: command 0x0419 tx timeout [ 90.321430] Bluetooth: hci6: command 0x0419 tx timeout 12:49:36 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xee) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) fsetxattr$security_ima(r0, &(0x7f0000000080), &(0x7f00000000c0)=@sha1={0x1, "1f95a1bfeb777dbe280223dd92fc1d37dae377f1"}, 0x15, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x0, 0xca5, 0x0, 0x4}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00000001c0)=""/215, &(0x7f00000002c0)=0xd7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000440)={&(0x7f0000000340), 0xc, 0x0}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000540)={0x0, @isdn={0x22, 0x20, 0x0, 0x0, 0x40}, @xdp={0x2c, 0x2, 0x0, 0x12}, @can, 0x4, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000500)='veth0_virt_wifi\x00', 0x0, 0x0, 0x200}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000005c0)) accept$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000640)=0x14) 12:49:36 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xee) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) fsetxattr$security_ima(r0, &(0x7f0000000080), &(0x7f00000000c0)=@sha1={0x1, "1f95a1bfeb777dbe280223dd92fc1d37dae377f1"}, 0x15, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x0, 0xca5, 0x0, 0x4}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00000001c0)=""/215, &(0x7f00000002c0)=0xd7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000440)={&(0x7f0000000340), 0xc, 0x0}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000540)={0x0, @isdn={0x22, 0x20, 0x0, 0x0, 0x40}, @xdp={0x2c, 0x2, 0x0, 0x12}, @can, 0x4, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000500)='veth0_virt_wifi\x00', 0x0, 0x0, 0x200}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000005c0)) accept$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000640)=0x14) 12:49:36 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xee) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) fsetxattr$security_ima(r0, &(0x7f0000000080), &(0x7f00000000c0)=@sha1={0x1, "1f95a1bfeb777dbe280223dd92fc1d37dae377f1"}, 0x15, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x0, 0xca5, 0x0, 0x4}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00000001c0)=""/215, &(0x7f00000002c0)=0xd7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000440)={&(0x7f0000000340), 0xc, 0x0}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000540)={0x0, @isdn={0x22, 0x20, 0x0, 0x0, 0x40}, @xdp={0x2c, 0x2, 0x0, 0x12}, @can, 0x4, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000500)='veth0_virt_wifi\x00', 0x0, 0x0, 0x200}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000005c0)) accept$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000640)=0x14) 12:49:36 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xee) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) fsetxattr$security_ima(r0, &(0x7f0000000080), &(0x7f00000000c0)=@sha1={0x1, "1f95a1bfeb777dbe280223dd92fc1d37dae377f1"}, 0x15, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x0, 0xca5, 0x0, 0x4}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00000001c0)=""/215, &(0x7f00000002c0)=0xd7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000440)={&(0x7f0000000340), 0xc, 0x0}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000540)={0x0, @isdn={0x22, 0x20, 0x0, 0x0, 0x40}, @xdp={0x2c, 0x2, 0x0, 0x12}, @can, 0x4, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000500)='veth0_virt_wifi\x00', 0x0, 0x0, 0x200}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000005c0)) accept$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000640)=0x14) 12:49:36 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xee) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) fsetxattr$security_ima(r0, &(0x7f0000000080), &(0x7f00000000c0)=@sha1={0x1, "1f95a1bfeb777dbe280223dd92fc1d37dae377f1"}, 0x15, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x0, 0xca5, 0x0, 0x4}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00000001c0)=""/215, &(0x7f00000002c0)=0xd7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000440)={&(0x7f0000000340), 0xc, 0x0}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000540)={0x0, @isdn={0x22, 0x20, 0x0, 0x0, 0x40}, @xdp={0x2c, 0x2, 0x0, 0x12}, @can, 0x4, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000500)='veth0_virt_wifi\x00', 0x0, 0x0, 0x200}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000005c0)) accept$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000640)=0x14) 12:49:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x8cffffff}}]}) 12:49:36 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xee) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) fsetxattr$security_ima(r0, &(0x7f0000000080), &(0x7f00000000c0)=@sha1={0x1, "1f95a1bfeb777dbe280223dd92fc1d37dae377f1"}, 0x15, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x0, 0xca5, 0x0, 0x4}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f00000001c0)=""/215, &(0x7f00000002c0)=0xd7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000440)={&(0x7f0000000340), 0xc, 0x0}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000540)={0x0, @isdn={0x22, 0x20, 0x0, 0x0, 0x40}, @xdp={0x2c, 0x2, 0x0, 0x12}, @can, 0x4, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000500)='veth0_virt_wifi\x00', 0x0, 0x0, 0x200}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000005c0)) accept$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000640)=0x14) 12:49:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x8cffffff}}]}) [ 130.645733] audit: type=1400 audit(1663332579.829:7): avc: denied { open } for pid=3966 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 130.647174] audit: type=1400 audit(1663332579.829:8): avc: denied { kernel } for pid=3966 comm="syz-executor.6" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 12:49:40 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername(r0, 0x0, &(0x7f0000000100)) 12:49:40 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x8cffffff}}]}) 12:49:40 executing program 0: syz_emit_ethernet(0x8a, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010100, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@generic={0x2, 0xf, "bdbe3c6af51c4143e23450af61"}, @exp_fastopen={0xfe, 0x5, 0xf989, "f6"}, @generic={0x0, 0x9, "fa2eb6ab35ecb5"}, @exp_smc={0xfe, 0x6}, @nop, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @mss={0x2, 0x4}, @exp_fastopen={0xfe, 0x7, 0xf989, "7db37a"}]}}}}}}}, 0x0) 12:49:40 executing program 4: syz_io_uring_setup(0x30f8, &(0x7f00000032c0)={0x0, 0x0, 0x2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000003340), &(0x7f0000003380)) 12:49:40 executing program 1: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000980), 0xffffffffffffffff) 12:49:40 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) read(r1, &(0x7f00000004c0)=""/195, 0xc3) 12:49:40 executing program 2: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) read(r1, &(0x7f00000004c0)=""/195, 0xc3) 12:49:40 executing program 6: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) read(r1, &(0x7f00000004c0)=""/195, 0xc3) 12:49:41 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@multicast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x8, 0x3a, 0x0, @local, @local, {[], @echo_request}}}}}, 0x0) 12:49:41 executing program 0: syz_emit_ethernet(0x8a, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010100, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@generic={0x2, 0xf, "bdbe3c6af51c4143e23450af61"}, @exp_fastopen={0xfe, 0x5, 0xf989, "f6"}, @generic={0x0, 0x9, "fa2eb6ab35ecb5"}, @exp_smc={0xfe, 0x6}, @nop, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @mss={0x2, 0x4}, @exp_fastopen={0xfe, 0x7, 0xf989, "7db37a"}]}}}}}}}, 0x0) 12:49:41 executing program 7: syz_emit_ethernet(0x5a, &(0x7f0000000040)={@local, @remote, @void, {@ipv4={0x800, @tipc={{0x8, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@cipso={0x86, 0x9, 0x0, [{0x0, 0x3, '&'}]}]}}, @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}, 0x0) 12:49:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='(]\\{^!)\x00') ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) 12:49:41 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='journal_checksum') close(r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = accept(r1, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x80) fsetxattr$security_selinux(r2, &(0x7f0000000140), &(0x7f0000000240)='system_u:object_r:tpm_device_t:s0\x00', 0x22, 0x1) r3 = dup(r1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="15"], 0x6) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000001, 0x50, r3, 0x8) 12:49:41 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) read(r1, &(0x7f00000004c0)=""/195, 0xc3) 12:49:41 executing program 6: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) read(r1, &(0x7f00000004c0)=""/195, 0xc3) 12:49:41 executing program 2: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) read(r1, &(0x7f00000004c0)=""/195, 0xc3) [ 132.007186] audit: type=1400 audit(1663332581.191:9): avc: denied { write } for pid=3990 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 132.014532] ------------[ cut here ]------------ [ 132.015448] WARNING: CPU: 0 PID: 3994 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 132.016694] Modules linked in: [ 132.017129] CPU: 0 PID: 3994 Comm: syz-executor.7 Not tainted 6.0.0-rc5-next-20220916 #1 [ 132.018165] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 132.020271] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 132.021432] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 132.023742] RSP: 0018:ffff88806ce09e48 EFLAGS: 00010046 [ 132.024427] RAX: 0000000080010002 RBX: 0000000000000000 RCX: 0000000000000000 [ 132.025337] RDX: ffff88800ffb5040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 132.026252] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 132.027160] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88806ce3d100 [ 132.028105] R13: ffff88806ce3d100 R14: ffffffff8547c7c0 R15: 0000000000000002 [ 132.029064] FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 132.030107] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 132.030879] CR2: 00007fcfcac61ef8 CR3: 0000000039978000 CR4: 0000000000350ef0 [ 132.031823] Call Trace: [ 132.032178] [ 132.032491] ctx_sched_out+0x8f1/0xc10 [ 132.033031] ctx_resched+0x2f3/0x390 [ 132.033549] __perf_install_in_context+0x285/0x9c0 [ 132.034210] ? ctx_resched+0x390/0x390 [ 132.034741] remote_function+0x125/0x1b0 [ 132.035308] __flush_smp_call_function_queue+0x1df/0x5a0 [ 132.036055] ? perf_duration_warn+0x40/0x40 [ 132.036658] __sysvec_call_function_single+0x92/0x3a0 [ 132.037357] sysvec_call_function_single+0x89/0xc0 [ 132.038013] [ 132.038317] [ 132.038623] asm_sysvec_call_function_single+0x16/0x20 [ 132.039329] RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x70 [ 132.040067] Code: 81 e1 00 01 00 00 65 48 8b 14 25 c0 6e 02 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 34 14 00 00 85 c0 74 2b 8b 82 10 14 00 00 <83> f8 02 75 20 48 8b 8a 18 14 00 00 8b 92 14 14 00 00 48 8b 01 48 [ 132.042441] RSP: 0018:ffff888041e1f640 EFLAGS: 00000246 [ 132.043148] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 132.044112] RDX: ffff88800ffb5040 RSI: ffffffff8169329c RDI: 0000000000000005 [ 132.045049] RBP: ffff88804182e2d0 R08: 0000000000000005 R09: 0000000000000000 [ 132.045980] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888041e1fa30 [ 132.046916] R13: ffffea0000f4b400 R14: dffffc0000000000 R15: ffffea0000f4b400 [ 132.047875] ? unmap_page_range+0x1fdc/0x2a10 [ 132.048502] unmap_page_range+0x1fdc/0x2a10 [ 132.049132] ? vm_normal_page+0x2e0/0x2e0 [ 132.049711] ? mas_find+0x209/0xdd0 [ 132.050219] ? uprobe_munmap+0x1c/0x560 [ 132.050783] unmap_single_vma+0x190/0x380 [ 132.051364] unmap_vmas+0x21e/0x370 [ 132.051877] ? unmap_mapping_range+0x280/0x280 [ 132.052510] ? find_held_lock+0x2c/0x110 [ 132.053078] ? lock_downgrade+0x6d0/0x6d0 [ 132.053678] exit_mmap+0x154/0x680 [ 132.054179] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 132.054925] ? delayed_uprobe_remove+0x27/0x230 [ 132.055579] mmput+0xd1/0x390 [ 132.056033] do_exit+0xa2e/0x27f0 [ 132.056521] ? lock_release+0x3b2/0x750 [ 132.057067] ? get_signal+0x88b/0x22d0 [ 132.057598] ? mm_update_next_owner+0x7e0/0x7e0 [ 132.058243] ? lock_is_held_type+0xd7/0x130 [ 132.058841] do_group_exit+0xd0/0x2a0 [ 132.059390] get_signal+0x219a/0x22d0 [ 132.059938] ? wake_up_q+0x8b/0xf0 [ 132.060452] ? exit_signals+0x8b0/0x8b0 [ 132.061016] arch_do_signal_or_restart+0x89/0x1be0 [ 132.061682] ? do_futex+0x136/0x380 [ 132.062190] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 132.062959] ? get_sigframe_size+0x10/0x10 [ 132.063531] ? __fget_files+0x270/0x450 [ 132.064093] ? __x64_sys_futex+0x1c6/0x4d0 [ 132.064667] ? fput+0x2b/0x190 [ 132.065112] ? __x64_sys_futex_time32+0x480/0x480 [ 132.065767] ? exit_to_user_mode_prepare+0x109/0x1a0 [ 132.066472] exit_to_user_mode_prepare+0x131/0x1a0 [ 132.067147] syscall_exit_to_user_mode+0x19/0x40 [ 132.067815] do_syscall_64+0x48/0x90 [ 132.068326] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 132.069022] RIP: 0033:0x7f9c9ac03b19 [ 132.069527] Code: Unable to access opcode bytes at RIP 0x7f9c9ac03aef. [ 132.070385] RSP: 002b:00007f9c98179218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 132.071384] RAX: fffffffffffffe00 RBX: 00007f9c9ad16f68 RCX: 00007f9c9ac03b19 [ 132.072319] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f9c9ad16f68 [ 132.073262] RBP: 00007f9c9ad16f60 R08: 0000000000000000 R09: 0000000000000000 [ 132.074195] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c9ad16f6c [ 132.075160] R13: 00007ffe737e7bdf R14: 00007f9c98179300 R15: 0000000000022000 [ 132.076135] [ 132.076456] irq event stamp: 294 [ 132.076908] hardirqs last enabled at (293): [] asm_sysvec_call_function_single+0x16/0x20 [ 132.078199] hardirqs last disabled at (294): [] sysvec_call_function_single+0xb/0xc0 [ 132.079446] softirqs last enabled at (270): [] __irq_exit_rcu+0x11b/0x180 [ 132.080568] softirqs last disabled at (233): [] __irq_exit_rcu+0x11b/0x180 [ 132.081693] ---[ end trace 0000000000000000 ]--- [ 132.082374] ------------[ cut here ]------------ [ 132.082990] WARNING: CPU: 0 PID: 3994 at kernel/events/core.c:2233 event_filter_match+0x422/0x660 [ 132.084196] Modules linked in: [ 132.084638] CPU: 0 PID: 3994 Comm: syz-executor.7 Tainted: G W 6.0.0-rc5-next-20220916 #1 [ 132.085880] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 132.087357] RIP: 0010:event_filter_match+0x422/0x660 [ 132.088065] Code: 00 00 00 e9 7c fc ff ff e8 4b 15 f1 ff 65 8b 2d c0 73 ad 7e 31 ff 89 ee e8 eb 11 f1 ff 85 ed 0f 84 ef 00 00 00 e8 2e 15 f1 ff <0f> 0b eb 9f e8 05 92 23 00 e9 17 fc ff ff e8 1b 15 f1 ff 48 8d 7b [ 132.090425] RSP: 0018:ffff88806ce09c70 EFLAGS: 00010046 [ 132.091154] RAX: 0000000080010002 RBX: ffff8880086605c8 RCX: 0000000000000000 [ 132.092103] RDX: ffff88800ffb5040 RSI: ffffffff81550212 RDI: 0000000000000005 [ 132.093054] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000001 [ 132.093975] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff8880086607e8 [ 132.094876] R13: 0000000000000000 R14: ffff888008660670 R15: ffff8880086607e8 [ 132.095801] FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 132.096820] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 132.097567] CR2: 00007fcfcac61ef8 CR3: 0000000039978000 CR4: 0000000000350ef0 [ 132.098489] Call Trace: [ 132.098842] [ 132.099143] merge_sched_in+0x107/0x1110 [ 132.099705] visit_groups_merge.constprop.0.isra.0+0x4fc/0xef0 [ 132.100487] ? merge_sched_in+0x1110/0x1110 [ 132.101051] ? lock_is_held_type+0xd7/0x130 [ 132.101664] ctx_sched_in+0x2e6/0x770 [ 132.102215] ? group_sched_out.part.0+0x2c7/0x460 [ 132.102902] ? visit_groups_merge.constprop.0.isra.0+0xef0/0xef0 [ 132.103730] ? group_sched_out.part.0+0x25c/0x460 [ 132.104431] perf_event_sched_in+0x75/0x80 [ 132.105009] ctx_resched+0x1ce/0x390 [ 132.105557] __perf_install_in_context+0x285/0x9c0 [ 132.106263] ? ctx_resched+0x390/0x390 [ 132.106821] remote_function+0x125/0x1b0 [ 132.107400] __flush_smp_call_function_queue+0x1df/0x5a0 [ 132.108147] ? perf_duration_warn+0x40/0x40 [ 132.108748] __sysvec_call_function_single+0x92/0x3a0 [ 132.109454] sysvec_call_function_single+0x89/0xc0 [ 132.110160] [ 132.110481] [ 132.110797] asm_sysvec_call_function_single+0x16/0x20 [ 132.111539] RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x70 [ 132.112272] Code: 81 e1 00 01 00 00 65 48 8b 14 25 c0 6e 02 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 34 14 00 00 85 c0 74 2b 8b 82 10 14 00 00 <83> f8 02 75 20 48 8b 8a 18 14 00 00 8b 92 14 14 00 00 48 8b 01 48 [ 132.114718] RSP: 0018:ffff888041e1f640 EFLAGS: 00000246 [ 132.115461] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 132.116448] RDX: ffff88800ffb5040 RSI: ffffffff8169329c RDI: 0000000000000005 [ 132.117430] RBP: ffff88804182e2d0 R08: 0000000000000005 R09: 0000000000000000 [ 132.118408] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888041e1fa30 [ 132.119420] R13: ffffea0000f4b400 R14: dffffc0000000000 R15: ffffea0000f4b400 [ 132.120418] ? unmap_page_range+0x1fdc/0x2a10 [ 132.121060] unmap_page_range+0x1fdc/0x2a10 [ 132.121714] ? vm_normal_page+0x2e0/0x2e0 [ 132.122333] ? mas_find+0x209/0xdd0 [ 132.122862] ? uprobe_munmap+0x1c/0x560 [ 132.123457] unmap_single_vma+0x190/0x380 [ 132.124063] unmap_vmas+0x21e/0x370 [ 132.124589] ? unmap_mapping_range+0x280/0x280 [ 132.125239] ? find_held_lock+0x2c/0x110 [ 132.125837] ? lock_downgrade+0x6d0/0x6d0 [ 132.126466] exit_mmap+0x154/0x680 [ 132.126989] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 132.127749] ? delayed_uprobe_remove+0x27/0x230 [ 132.128407] mmput+0xd1/0x390 [ 132.128864] do_exit+0xa2e/0x27f0 [ 132.129361] ? lock_release+0x3b2/0x750 [ 132.129909] ? get_signal+0x88b/0x22d0 [ 132.130446] ? mm_update_next_owner+0x7e0/0x7e0 [ 132.131097] ? lock_is_held_type+0xd7/0x130 [ 132.131712] do_group_exit+0xd0/0x2a0 [ 132.132243] get_signal+0x219a/0x22d0 [ 132.132772] ? wake_up_q+0x8b/0xf0 [ 132.133290] ? exit_signals+0x8b0/0x8b0 [ 132.133865] arch_do_signal_or_restart+0x89/0x1be0 [ 132.134536] ? do_futex+0x136/0x380 [ 132.135043] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 132.135836] ? get_sigframe_size+0x10/0x10 [ 132.136406] ? __fget_files+0x270/0x450 [ 132.136975] ? __x64_sys_futex+0x1c6/0x4d0 [ 132.137569] ? fput+0x2b/0x190 [ 132.138025] ? __x64_sys_futex_time32+0x480/0x480 [ 132.138800] ? exit_to_user_mode_prepare+0x109/0x1a0 [ 132.139493] exit_to_user_mode_prepare+0x131/0x1a0 [ 132.140150] syscall_exit_to_user_mode+0x19/0x40 [ 132.140784] do_syscall_64+0x48/0x90 [ 132.141285] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 132.141967] RIP: 0033:0x7f9c9ac03b19 [ 132.142456] Code: Unable to access opcode bytes at RIP 0x7f9c9ac03aef. [ 132.143299] RSP: 002b:00007f9c98179218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 132.144295] RAX: fffffffffffffe00 RBX: 00007f9c9ad16f68 RCX: 00007f9c9ac03b19 [ 132.145209] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f9c9ad16f68 [ 132.146130] RBP: 00007f9c9ad16f60 R08: 0000000000000000 R09: 0000000000000000 [ 132.147055] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c9ad16f6c [ 132.147983] R13: 00007ffe737e7bdf R14: 00007f9c98179300 R15: 0000000000022000 [ 132.148931] [ 132.149246] irq event stamp: 294 [ 132.149687] hardirqs last enabled at (293): [] asm_sysvec_call_function_single+0x16/0x20 [ 132.150940] hardirqs last disabled at (294): [] sysvec_call_function_single+0xb/0xc0 [ 132.152146] softirqs last enabled at (270): [] __irq_exit_rcu+0x11b/0x180 [ 132.153269] softirqs last disabled at (233): [] __irq_exit_rcu+0x11b/0x180 [ 132.154365] ---[ end trace 0000000000000000 ]--- [ 132.155031] ------------[ cut here ]------------ [ 132.155656] WARNING: CPU: 0 PID: 3994 at kernel/events/core.c:2557 merge_sched_in+0xadb/0x1110 [ 132.156770] Modules linked in: [ 132.157197] CPU: 0 PID: 3994 Comm: syz-executor.7 Tainted: G W 6.0.0-rc5-next-20220916 #1 [ 132.158408] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 132.159853] RIP: 0010:merge_sched_in+0xadb/0x1110 [ 132.160482] Code: ff ff e8 78 16 ef ff 65 8b 05 ed 74 ab 7e 31 ff 89 c6 89 04 24 e8 15 13 ef ff 8b 04 24 85 c0 0f 84 13 02 00 00 e8 55 16 ef ff <0f> 0b e9 c4 fb ff ff e8 49 16 ef ff 4c 89 e8 48 05 18 01 00 00 e9 [ 132.162801] RSP: 0018:ffff88806ce09cb0 EFLAGS: 00010046 [ 132.163498] RAX: 0000000080010002 RBX: ffff88806ce3d100 RCX: 0000000000000000 [ 132.164412] RDX: ffff88800ffb5040 RSI: ffffffff815700eb RDI: 0000000000000005 [ 132.165326] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 132.166244] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88806ce3d100 [ 132.167157] R13: ffff88806ce00000 R14: ffff888008660670 R15: ffff8880086607e8 [ 132.168098] FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 132.169159] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 132.169916] CR2: 00007fcfcac61ef8 CR3: 0000000039978000 CR4: 0000000000350ef0 [ 132.170832] Call Trace: [ 132.171177] [ 132.171498] visit_groups_merge.constprop.0.isra.0+0x4fc/0xef0 [ 132.172287] ? merge_sched_in+0x1110/0x1110 [ 132.172848] ? lock_is_held_type+0xd7/0x130 [ 132.173441] ctx_sched_in+0x2e6/0x770 [ 132.173945] ? group_sched_out.part.0+0x2c7/0x460 [ 132.174582] ? visit_groups_merge.constprop.0.isra.0+0xef0/0xef0 [ 132.175376] ? group_sched_out.part.0+0x25c/0x460 [ 132.176027] perf_event_sched_in+0x75/0x80 [ 132.176583] ctx_resched+0x1ce/0x390 [ 132.177083] __perf_install_in_context+0x285/0x9c0 [ 132.177726] ? ctx_resched+0x390/0x390 [ 132.178244] remote_function+0x125/0x1b0 [ 132.178794] __flush_smp_call_function_queue+0x1df/0x5a0 [ 132.179515] ? perf_duration_warn+0x40/0x40 [ 132.180095] __sysvec_call_function_single+0x92/0x3a0 [ 132.180780] sysvec_call_function_single+0x89/0xc0 [ 132.181430] [ 132.181731] [ 132.182037] asm_sysvec_call_function_single+0x16/0x20 [ 132.182729] RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x70 [ 132.183439] Code: 81 e1 00 01 00 00 65 48 8b 14 25 c0 6e 02 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 34 14 00 00 85 c0 74 2b 8b 82 10 14 00 00 <83> f8 02 75 20 48 8b 8a 18 14 00 00 8b 92 14 14 00 00 48 8b 01 48 [ 132.185766] RSP: 0018:ffff888041e1f640 EFLAGS: 00000246 [ 132.186455] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 132.187388] RDX: ffff88800ffb5040 RSI: ffffffff8169329c RDI: 0000000000000005 [ 132.188298] RBP: ffff88804182e2d0 R08: 0000000000000005 R09: 0000000000000000 [ 132.189214] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888041e1fa30 [ 132.190123] R13: ffffea0000f4b400 R14: dffffc0000000000 R15: ffffea0000f4b400 [ 132.191060] ? unmap_page_range+0x1fdc/0x2a10 [ 132.191683] unmap_page_range+0x1fdc/0x2a10 [ 132.192300] ? vm_normal_page+0x2e0/0x2e0 [ 132.192856] ? mas_find+0x209/0xdd0 [ 132.193352] ? uprobe_munmap+0x1c/0x560 [ 132.193894] unmap_single_vma+0x190/0x380 [ 132.194457] unmap_vmas+0x21e/0x370 [ 132.194959] ? unmap_mapping_range+0x280/0x280 [ 132.195581] ? find_held_lock+0x2c/0x110 [ 132.196138] ? lock_downgrade+0x6d0/0x6d0 [ 132.196730] exit_mmap+0x154/0x680 [ 132.197219] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 132.197945] ? delayed_uprobe_remove+0x27/0x230 [ 132.198575] mmput+0xd1/0x390 [ 132.199013] do_exit+0xa2e/0x27f0 [ 132.199499] ? lock_release+0x3b2/0x750 [ 132.200037] ? get_signal+0x88b/0x22d0 [ 132.200575] ? mm_update_next_owner+0x7e0/0x7e0 [ 132.201200] ? lock_is_held_type+0xd7/0x130 [ 132.201787] do_group_exit+0xd0/0x2a0 [ 132.202301] get_signal+0x219a/0x22d0 [ 132.202810] ? wake_up_q+0x8b/0xf0 [ 132.203307] ? exit_signals+0x8b0/0x8b0 [ 132.203865] arch_do_signal_or_restart+0x89/0x1be0 [ 132.204507] ? do_futex+0x136/0x380 [ 132.204998] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 132.205744] ? get_sigframe_size+0x10/0x10 [ 132.206300] ? __fget_files+0x270/0x450 [ 132.206846] ? __x64_sys_futex+0x1c6/0x4d0 [ 132.207419] ? fput+0x2b/0x190 [ 132.207854] ? __x64_sys_futex_time32+0x480/0x480 [ 132.208485] ? exit_to_user_mode_prepare+0x109/0x1a0 [ 132.209171] exit_to_user_mode_prepare+0x131/0x1a0 [ 132.209826] syscall_exit_to_user_mode+0x19/0x40 [ 132.210454] do_syscall_64+0x48/0x90 [ 132.210955] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 132.211639] RIP: 0033:0x7f9c9ac03b19 [ 132.212127] Code: Unable to access opcode bytes at RIP 0x7f9c9ac03aef. [ 132.212965] RSP: 002b:00007f9c98179218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 132.213943] RAX: fffffffffffffe00 RBX: 00007f9c9ad16f68 RCX: 00007f9c9ac03b19 [ 132.214860] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f9c9ad16f68 [ 132.215818] RBP: 00007f9c9ad16f60 R08: 0000000000000000 R09: 0000000000000000 [ 132.216736] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9c9ad16f6c [ 132.217654] R13: 00007ffe737e7bdf R14: 00007f9c98179300 R15: 0000000000022000 [ 132.218590] [ 132.218904] irq event stamp: 294 [ 132.219342] hardirqs last enabled at (293): [] asm_sysvec_call_function_single+0x16/0x20 [ 132.220605] hardirqs last disabled at (294): [] sysvec_call_function_single+0xb/0xc0 [ 132.221798] softirqs last enabled at (270): [] __irq_exit_rcu+0x11b/0x180 [ 132.222893] softirqs last disabled at (233): [] __irq_exit_rcu+0x11b/0x180 [ 132.223996] ---[ end trace 0000000000000000 ]--- 12:49:41 executing program 0: syz_emit_ethernet(0x8a, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010100, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@generic={0x2, 0xf, "bdbe3c6af51c4143e23450af61"}, @exp_fastopen={0xfe, 0x5, 0xf989, "f6"}, @generic={0x0, 0x9, "fa2eb6ab35ecb5"}, @exp_smc={0xfe, 0x6}, @nop, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @mss={0x2, 0x4}, @exp_fastopen={0xfe, 0x7, 0xf989, "7db37a"}]}}}}}}}, 0x0) 12:49:41 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) getpeername$inet6(r1, 0x0, &(0x7f00000000c0)) 12:49:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x163008, 0x0) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2880, 0x0) 12:49:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x32, &(0x7f0000000200)={0x77359400}, 0x10) 12:49:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='(]\\{^!)\x00') ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) [ 132.367996] Bluetooth: MGMT ver 1.22 [ 132.393833] ------------[ cut here ]------------ [ 132.394477] WARNING: CPU: 0 PID: 3999 at kernel/events/core.c:2047 perf_group_detach+0x99e/0x12f0 [ 132.395673] Modules linked in: [ 132.396108] CPU: 0 PID: 3999 Comm: syz-executor.1 Tainted: G W 6.0.0-rc5-next-20220916 #1 [ 132.397303] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 132.398717] RIP: 0010:perf_group_detach+0x99e/0x12f0 [ 132.399382] Code: 85 d5 f8 ff ff e8 22 57 ee ff 65 44 8b 25 96 b5 aa 7e 31 ff 44 89 e6 e8 c0 53 ee ff 45 85 e4 0f 84 0a 05 00 00 e8 02 57 ee ff <0f> 0b e9 a9 f8 ff ff e8 f6 56 ee ff 65 8b 1d 6b b5 aa 7e 31 ff 89 [ 132.401926] RSP: 0018:ffff88806ce09e60 EFLAGS: 00010046 [ 132.402683] RAX: 0000000080010001 RBX: ffff888040781ce8 RCX: 0000000000000000 [ 132.403682] RDX: ffff888017459ac0 RSI: ffffffff8157c03e RDI: 0000000000000005 [ 132.404666] RBP: ffff888040781ce8 R08: 0000000000000005 R09: 0000000000000001 [ 132.405671] R10: 0000000000000000 R11: ffffffff865ac01b R12: 0000000000000000 [ 132.406658] R13: ffff888040781d78 R14: ffff88806ce3d100 R15: ffff888040781ce8 [ 132.407670] FS: 000055555690e400(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 132.408780] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 132.409584] CR2: 00007fc4a6932b58 CR3: 000000000df78000 CR4: 0000000000350ef0 [ 132.410574] Call Trace: [ 132.410944] [ 132.411259] ? perf_event_idx_default+0x10/0x10 [ 132.411948] ? event_sched_out+0x71c/0xcd0 [ 132.412560] __perf_remove_from_context+0x71e/0xb20 [ 132.413280] event_function+0x297/0x3d0 [ 132.413843] ? perf_output_read+0xf80/0xf80 [ 132.414452] remote_function+0x125/0x1b0 [ 132.415044] __flush_smp_call_function_queue+0x1df/0x5a0 [ 132.415804] ? perf_duration_warn+0x40/0x40 [ 132.416422] __sysvec_call_function_single+0x92/0x3a0 [ 132.417174] sysvec_call_function_single+0x89/0xc0 [ 132.417834] [ 132.418136] [ 132.418438] asm_sysvec_call_function_single+0x16/0x20 [ 132.419127] RIP: 0010:unwind_get_return_address+0x55/0xa0 [ 132.419858] Code: 5d e9 6f 8a 4e 03 48 b8 00 00 00 00 00 fc ff df 48 8d 6b 58 48 89 ea 48 c1 ea 03 80 3c 02 00 75 36 48 8b 7b 58 e8 4b b1 0b 00 <85> c0 74 cf 48 b8 00 00 00 00 00 fc ff df 48 89 ea 48 c1 ea 03 80 [ 132.422141] RSP: 0018:ffff8880416d7648 EFLAGS: 00000202 [ 132.422828] RAX: 0000000000000001 RBX: ffff8880416d7660 RCX: ffff8880416d7700 [ 132.423740] RDX: 1ffff110082daed7 RSI: ffff8880416d76f8 RDI: ffffffff8135b60c [ 132.424652] RBP: ffff8880416d76b8 R08: ffffffff85e2e806 R09: ffffffff85e2e80a [ 132.425563] R10: ffffed10082daed9 R11: ffff8880416d76a0 R12: ffff8880416d7728 [ 132.426480] R13: 0000000000000000 R14: ffff888017459ac0 R15: ffff88804095ea00 [ 132.427426] ? stack_trace_save+0x8c/0xc0 [ 132.428010] ? unwind_get_return_address+0x55/0xa0 [ 132.428689] ? write_profile+0x3e0/0x3e0 [ 132.429256] arch_stack_walk+0x99/0xf0 [ 132.429814] ? stack_trace_save+0x8c/0xc0 [ 132.430391] stack_trace_save+0x8c/0xc0 [ 132.430940] ? filter_irq_stacks+0x90/0x90 [ 132.431543] ? mark_lock.part.0+0xef/0x2f70 [ 132.432151] kasan_save_stack+0x1e/0x40 [ 132.432718] ? mark_lock.part.0+0xef/0x2f70 [ 132.433319] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 132.434028] ? lock_chain_count+0x20/0x20 [ 132.434596] ? arch_stack_walk+0x5f/0xf0 [ 132.435175] ? lock_is_held_type+0xd7/0x130 [ 132.435780] ? find_held_lock+0x2c/0x110 [ 132.436341] ? lock_release+0x3b2/0x750 [ 132.436884] ? __delete_object+0xb3/0x100 [ 132.437457] ? __virt_addr_valid+0xfe/0x340 [ 132.438067] ? hugetlb_cgroup_migrate+0xf60/0xf60 [ 132.438721] __kasan_record_aux_stack+0x95/0xb0 [ 132.439386] ? hugetlb_cgroup_migrate+0xf60/0xf60 [ 132.440054] call_rcu+0x6a/0xa30 [ 132.440528] ? _raw_spin_unlock_irqrestore+0x33/0x60 [ 132.441235] kmem_cache_free_bulk.part.0+0x305/0x770 [ 132.441939] ? mas_destroy+0x380/0x560 [ 132.442488] mas_destroy+0x380/0x560 [ 132.443025] mas_store_prealloc+0xf0/0x160 [ 132.443618] ? mas_destroy+0x560/0x560 [ 132.444186] ? rcu_read_lock_sched_held+0x3e/0x80 [ 132.444860] vma_expand+0x7c1/0xb50 [ 132.445378] ? can_vma_merge_before.constprop.0+0x83/0x230 [ 132.446142] mmap_region+0xca6/0x1a00 [ 132.446690] ? do_munmap+0x100/0x100 [ 132.447215] ? security_mmap_addr+0x79/0xa0 [ 132.447837] ? get_unmapped_area+0x1e5/0x3e0 [ 132.448449] do_mmap+0x828/0xf40 [ 132.448939] vm_mmap_pgoff+0x1af/0x270 [ 132.449492] ? randomize_page+0xb0/0xb0 [ 132.450031] ? __x64_sys_futex+0x1cf/0x4d0 [ 132.450631] ksys_mmap_pgoff+0x79/0x4f0 [ 132.451187] do_syscall_64+0x3b/0x90 [ 132.451714] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 132.452430] RIP: 0033:0x7fd40a97ab62 [ 132.452939] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 132.455378] RSP: 002b:00007ffc0b89a308 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 132.456367] RAX: ffffffffffffffda RBX: 0000000000020022 RCX: 00007fd40a97ab62 [ 132.457329] RDX: 0000000000000000 RSI: 0000000000021000 RDI: 0000000000000000 [ 132.458277] RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000 [ 132.459234] R10: 0000000000020022 R11: 0000000000000246 R12: 00007ffc0b89a500 [ 132.460197] R13: 00007fd4086f1700 R14: 0000000000000000 R15: 0000000000022000 [ 132.461174] [ 132.461500] irq event stamp: 3090 [ 132.461961] hardirqs last enabled at (3089): [] _raw_spin_unlock_irqrestore+0x28/0x60 [ 132.463219] hardirqs last disabled at (3090): [] sysvec_call_function_single+0xb/0xc0 [ 132.464497] softirqs last enabled at (2832): [] hci_sock_release+0x202/0x470 [ 132.465661] softirqs last disabled at (2830): [] release_sock+0x1b/0x1b0 [ 132.466765] ---[ end trace 0000000000000000 ]--- [ 132.467449] ------------[ cut here ]------------ [ 132.468070] WARNING: CPU: 0 PID: 3999 at kernel/events/core.c:2183 perf_group_detach+0x9c7/0x12f0 [ 132.469250] Modules linked in: [ 132.469686] CPU: 0 PID: 3999 Comm: syz-executor.1 Tainted: G W 6.0.0-rc5-next-20220916 #1 [ 132.470938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 132.472436] RIP: 0010:perf_group_detach+0x9c7/0x12f0 [ 132.473128] Code: ff 0f 0b e9 a9 f8 ff ff e8 f6 56 ee ff 65 8b 1d 6b b5 aa 7e 31 ff 89 de e8 96 53 ee ff 85 db 0f 84 86 04 00 00 e8 d9 56 ee ff <0f> 0b e9 0e fa ff ff e8 cd 56 ee ff 48 8b 7c 24 20 48 81 c7 f8 00 [ 132.475542] RSP: 0018:ffff88806ce09e60 EFLAGS: 00010046 [ 132.476244] RAX: 0000000080010001 RBX: 0000000000000000 RCX: 0000000000000000 [ 132.477181] RDX: ffff888017459ac0 RSI: ffffffff8157c067 RDI: 0000000000000005 [ 132.478116] RBP: ffff888040781ce8 R08: 0000000000000005 R09: 0000000000000001 [ 132.479070] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff888040781ce8 [ 132.480057] R13: ffff888040781ce8 R14: ffff88806ce3d100 R15: ffff888040781ce8 [ 132.481003] FS: 000055555690e400(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 132.482070] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 132.482847] CR2: 00007fc4a6932b58 CR3: 000000000df78000 CR4: 0000000000350ef0 [ 132.483794] Call Trace: [ 132.484150] [ 132.484455] ? perf_event_idx_default+0x10/0x10 [ 132.485090] ? event_sched_out+0x71c/0xcd0 [ 132.485672] __perf_remove_from_context+0x71e/0xb20 [ 132.486351] event_function+0x297/0x3d0 [ 132.486898] ? perf_output_read+0xf80/0xf80 [ 132.487512] remote_function+0x125/0x1b0 [ 132.488079] __flush_smp_call_function_queue+0x1df/0x5a0 [ 132.488803] ? perf_duration_warn+0x40/0x40 [ 132.489409] __sysvec_call_function_single+0x92/0x3a0 [ 132.490113] sysvec_call_function_single+0x89/0xc0 [ 132.490785] [ 132.491100] [ 132.491433] asm_sysvec_call_function_single+0x16/0x20 [ 132.492140] RIP: 0010:unwind_get_return_address+0x55/0xa0 [ 132.492869] Code: 5d e9 6f 8a 4e 03 48 b8 00 00 00 00 00 fc ff df 48 8d 6b 58 48 89 ea 48 c1 ea 03 80 3c 02 00 75 36 48 8b 7b 58 e8 4b b1 0b 00 <85> c0 74 cf 48 b8 00 00 00 00 00 fc ff df 48 89 ea 48 c1 ea 03 80 [ 132.495238] RSP: 0018:ffff8880416d7648 EFLAGS: 00000202 [ 132.495971] RAX: 0000000000000001 RBX: ffff8880416d7660 RCX: ffff8880416d7700 [ 132.496913] RDX: 1ffff110082daed7 RSI: ffff8880416d76f8 RDI: ffffffff8135b60c [ 132.497849] RBP: ffff8880416d76b8 R08: ffffffff85e2e806 R09: ffffffff85e2e80a [ 132.498793] R10: ffffed10082daed9 R11: ffff8880416d76a0 R12: ffff8880416d7728 [ 132.499756] R13: 0000000000000000 R14: ffff888017459ac0 R15: ffff88804095ea00 [ 132.500722] ? stack_trace_save+0x8c/0xc0 [ 132.501302] ? unwind_get_return_address+0x55/0xa0 [ 132.501977] ? write_profile+0x3e0/0x3e0 [ 132.502537] arch_stack_walk+0x99/0xf0 [ 132.503091] ? stack_trace_save+0x8c/0xc0 [ 132.503688] stack_trace_save+0x8c/0xc0 [ 132.504252] ? filter_irq_stacks+0x90/0x90 [ 132.504841] ? mark_lock.part.0+0xef/0x2f70 [ 132.505449] kasan_save_stack+0x1e/0x40 [ 132.506016] ? mark_lock.part.0+0xef/0x2f70 [ 132.506628] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 132.507347] ? lock_chain_count+0x20/0x20 [ 132.507924] ? arch_stack_walk+0x5f/0xf0 [ 132.508499] ? lock_is_held_type+0xd7/0x130 [ 132.509089] ? find_held_lock+0x2c/0x110 [ 132.509645] ? lock_release+0x3b2/0x750 [ 132.510187] ? __delete_object+0xb3/0x100 [ 132.510755] ? __virt_addr_valid+0xfe/0x340 [ 132.511351] ? hugetlb_cgroup_migrate+0xf60/0xf60 [ 132.512025] __kasan_record_aux_stack+0x95/0xb0 [ 132.512660] ? hugetlb_cgroup_migrate+0xf60/0xf60 [ 132.513316] call_rcu+0x6a/0xa30 [ 132.513777] ? _raw_spin_unlock_irqrestore+0x33/0x60 [ 132.514475] kmem_cache_free_bulk.part.0+0x305/0x770 [ 132.515161] ? mas_destroy+0x380/0x560 [ 132.515713] mas_destroy+0x380/0x560 [ 132.516238] mas_store_prealloc+0xf0/0x160 [ 132.516822] ? mas_destroy+0x560/0x560 [ 132.517383] ? rcu_read_lock_sched_held+0x3e/0x80 [ 132.518039] vma_expand+0x7c1/0xb50 [ 132.518550] ? can_vma_merge_before.constprop.0+0x83/0x230 [ 132.519312] mmap_region+0xca6/0x1a00 [ 132.519863] ? do_munmap+0x100/0x100 [ 132.520389] ? security_mmap_addr+0x79/0xa0 [ 132.520983] ? get_unmapped_area+0x1e5/0x3e0 [ 132.521588] do_mmap+0x828/0xf40 [ 132.522073] vm_mmap_pgoff+0x1af/0x270 [ 132.522611] ? randomize_page+0xb0/0xb0 [ 132.523147] ? __x64_sys_futex+0x1cf/0x4d0 [ 132.523745] ksys_mmap_pgoff+0x79/0x4f0 [ 132.524293] do_syscall_64+0x3b/0x90 [ 132.524810] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 132.525511] RIP: 0033:0x7fd40a97ab62 [ 132.526017] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 132.528402] RSP: 002b:00007ffc0b89a308 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 132.529420] RAX: ffffffffffffffda RBX: 0000000000020022 RCX: 00007fd40a97ab62 [ 132.530371] RDX: 0000000000000000 RSI: 0000000000021000 RDI: 0000000000000000 [ 132.531304] RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000 [ 132.532268] R10: 0000000000020022 R11: 0000000000000246 R12: 00007ffc0b89a500 [ 132.533230] R13: 00007fd4086f1700 R14: 0000000000000000 R15: 0000000000022000 [ 132.534197] [ 132.534514] irq event stamp: 3090 [ 132.534974] hardirqs last enabled at (3089): [] _raw_spin_unlock_irqrestore+0x28/0x60 [ 132.536249] hardirqs last disabled at (3090): [] sysvec_call_function_single+0xb/0xc0 [ 132.537471] softirqs last enabled at (2832): [] hci_sock_release+0x202/0x470 [ 132.538623] softirqs last disabled at (2830): [] release_sock+0x1b/0x1b0 [ 132.539721] ---[ end trace 0000000000000000 ]--- [ 132.540391] ------------[ cut here ]------------ [ 132.541003] WARNING: CPU: 0 PID: 3999 at kernel/events/core.c:655 perf_event_update_sibling_time+0xd5/0x4d0 [ 132.542295] Modules linked in: [ 132.542726] CPU: 0 PID: 3999 Comm: syz-executor.1 Tainted: G W 6.0.0-rc5-next-20220916 #1 [ 132.543989] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 132.545469] RIP: 0010:perf_event_update_sibling_time+0xd5/0x4d0 [ 132.546279] Code: 5e 41 5f e9 5d c5 f0 ff e8 58 c5 f0 ff 65 8b 1d cd 23 ad 7e 31 ff 89 de e8 f8 c1 f0 ff 85 db 0f 84 d3 02 00 00 e8 3b c5 f0 ff <0f> 0b eb 97 e8 32 c5 f0 ff 48 8d 7d 10 48 b8 00 00 00 00 00 fc ff [ 132.548651] RSP: 0018:ffff88806ce09e58 EFLAGS: 00010046 [ 132.549353] RAX: 0000000080010001 RBX: 0000000000000000 RCX: 0000000000000000 [ 132.550272] RDX: ffff888017459ac0 RSI: ffffffff81555205 RDI: 0000000000000005 [ 132.551184] RBP: ffff888040781ce8 R08: 0000000000000005 R09: 0000000000000001 [ 132.552118] R10: 0000000000000000 R11: ffffffff865ac01b R12: 0000000000000000 [ 132.553044] R13: ffff888040781d90 R14: 0000000000000001 R15: 0000000000000001 [ 132.553987] FS: 000055555690e400(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 132.554987] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 132.555743] CR2: 00007fc4a6932b58 CR3: 000000000df78000 CR4: 0000000000350ef0 [ 132.556649] Call Trace: [ 132.556999] [ 132.557301] ? lock_is_held_type+0xd7/0x130 [ 132.557891] ? perf_event_update_time+0x285/0x380 [ 132.558549] list_del_event+0x524/0x860 [ 132.559098] __perf_remove_from_context+0xd2/0xb20 [ 132.559789] event_function+0x297/0x3d0 [ 132.560328] ? perf_output_read+0xf80/0xf80 [ 132.560903] remote_function+0x125/0x1b0 [ 132.561467] __flush_smp_call_function_queue+0x1df/0x5a0 [ 132.562182] ? perf_duration_warn+0x40/0x40 [ 132.562766] __sysvec_call_function_single+0x92/0x3a0 [ 132.563483] sysvec_call_function_single+0x89/0xc0 [ 132.564137] [ 132.564446] [ 132.564759] asm_sysvec_call_function_single+0x16/0x20 [ 132.565487] RIP: 0010:unwind_get_return_address+0x55/0xa0 [ 132.566224] Code: 5d e9 6f 8a 4e 03 48 b8 00 00 00 00 00 fc ff df 48 8d 6b 58 48 89 ea 48 c1 ea 03 80 3c 02 00 75 36 48 8b 7b 58 e8 4b b1 0b 00 <85> c0 74 cf 48 b8 00 00 00 00 00 fc ff df 48 89 ea 48 c1 ea 03 80 [ 132.568609] RSP: 0018:ffff8880416d7648 EFLAGS: 00000202 [ 132.569310] RAX: 0000000000000001 RBX: ffff8880416d7660 RCX: ffff8880416d7700 [ 132.570250] RDX: 1ffff110082daed7 RSI: ffff8880416d76f8 RDI: ffffffff8135b60c [ 132.571171] RBP: ffff8880416d76b8 R08: ffffffff85e2e806 R09: ffffffff85e2e80a [ 132.572114] R10: ffffed10082daed9 R11: ffff8880416d76a0 R12: ffff8880416d7728 [ 132.573047] R13: 0000000000000000 R14: ffff888017459ac0 R15: ffff88804095ea00 [ 132.573981] ? stack_trace_save+0x8c/0xc0 [ 132.574554] ? unwind_get_return_address+0x55/0xa0 [ 132.575219] ? write_profile+0x3e0/0x3e0 [ 132.575778] arch_stack_walk+0x99/0xf0 [ 132.576329] ? stack_trace_save+0x8c/0xc0 [ 132.576912] stack_trace_save+0x8c/0xc0 [ 132.577458] ? filter_irq_stacks+0x90/0x90 [ 132.578034] ? mark_lock.part.0+0xef/0x2f70 [ 132.578644] kasan_save_stack+0x1e/0x40 [ 132.579196] ? mark_lock.part.0+0xef/0x2f70 [ 132.579790] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 132.580504] ? lock_chain_count+0x20/0x20 [ 132.581054] ? arch_stack_walk+0x5f/0xf0 [ 132.581625] ? lock_is_held_type+0xd7/0x130 [ 132.582214] ? find_held_lock+0x2c/0x110 [ 132.582778] ? lock_release+0x3b2/0x750 [ 132.583320] ? __delete_object+0xb3/0x100 [ 132.583895] ? __virt_addr_valid+0xfe/0x340 [ 132.584488] ? hugetlb_cgroup_migrate+0xf60/0xf60 [ 132.585137] __kasan_record_aux_stack+0x95/0xb0 [ 132.585772] ? hugetlb_cgroup_migrate+0xf60/0xf60 [ 132.586421] call_rcu+0x6a/0xa30 [ 132.586891] ? _raw_spin_unlock_irqrestore+0x33/0x60 [ 132.587602] kmem_cache_free_bulk.part.0+0x305/0x770 [ 132.588292] ? mas_destroy+0x380/0x560 [ 132.588831] mas_destroy+0x380/0x560 [ 132.589350] mas_store_prealloc+0xf0/0x160 [ 132.589925] ? mas_destroy+0x560/0x560 [ 132.590472] ? rcu_read_lock_sched_held+0x3e/0x80 [ 132.591125] vma_expand+0x7c1/0xb50 [ 132.591635] ? can_vma_merge_before.constprop.0+0x83/0x230 [ 132.592376] mmap_region+0xca6/0x1a00 [ 132.592916] ? do_munmap+0x100/0x100 [ 132.593432] ? security_mmap_addr+0x79/0xa0 [ 132.594014] ? get_unmapped_area+0x1e5/0x3e0 [ 132.594609] do_mmap+0x828/0xf40 [ 132.595088] vm_mmap_pgoff+0x1af/0x270 [ 132.595643] ? randomize_page+0xb0/0xb0 [ 132.596172] ? __x64_sys_futex+0x1cf/0x4d0 [ 132.596758] ksys_mmap_pgoff+0x79/0x4f0 [ 132.597300] do_syscall_64+0x3b/0x90 [ 132.597806] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 132.598492] RIP: 0033:0x7fd40a97ab62 [ 132.598979] Code: 00 00 00 00 00 0f 1f 00 41 f7 c1 ff 0f 00 00 75 27 55 48 89 fd 53 89 cb 48 85 ff 74 3b 41 89 da 48 89 ef b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 5b 5d c3 0f 1f 00 48 c7 c0 bc ff ff ff 64 [ 132.601339] RSP: 002b:00007ffc0b89a308 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 132.602325] RAX: ffffffffffffffda RBX: 0000000000020022 RCX: 00007fd40a97ab62 [ 132.603248] RDX: 0000000000000000 RSI: 0000000000021000 RDI: 0000000000000000 [ 132.604180] RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000 [ 132.605107] R10: 0000000000020022 R11: 0000000000000246 R12: 00007ffc0b89a500 [ 132.606038] R13: 00007fd4086f1700 R14: 0000000000000000 R15: 0000000000022000 [ 132.606990] [ 132.607307] irq event stamp: 3090 [ 132.607782] hardirqs last enabled at (3089): [] _raw_spin_unlock_irqrestore+0x28/0x60 [ 132.609002] hardirqs last disabled at (3090): [] sysvec_call_function_single+0xb/0xc0 [ 132.610207] softirqs last enabled at (2832): [] hci_sock_release+0x202/0x470 [ 132.611331] softirqs last disabled at (2830): [] release_sock+0x1b/0x1b0 [ 132.612420] ---[ end trace 0000000000000000 ]--- 12:49:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='(]\\{^!)\x00') ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) 12:49:42 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x32, &(0x7f0000000200)={0x77359400}, 0x10) 12:49:42 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0xffffff4c) 12:49:42 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) read(r1, &(0x7f00000004c0)=""/195, 0xc3) 12:49:42 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='journal_checksum') close(r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = accept(r1, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x80) fsetxattr$security_selinux(r2, &(0x7f0000000140), &(0x7f0000000240)='system_u:object_r:tpm_device_t:s0\x00', 0x22, 0x1) r3 = dup(r1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="15"], 0x6) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000001, 0x50, r3, 0x8) 12:49:42 executing program 6: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) read(r1, &(0x7f00000004c0)=""/195, 0xc3) 12:49:42 executing program 2: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) read(r1, &(0x7f00000004c0)=""/195, 0xc3) 12:49:42 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='journal_checksum') close(r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = accept(r1, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x80) fsetxattr$security_selinux(r2, &(0x7f0000000140), &(0x7f0000000240)='system_u:object_r:tpm_device_t:s0\x00', 0x22, 0x1) r3 = dup(r1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="15"], 0x6) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000001, 0x50, r3, 0x8) 12:49:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='(]\\{^!)\x00') ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) 12:49:42 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='journal_checksum') close(r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = accept(r1, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x80) fsetxattr$security_selinux(r2, &(0x7f0000000140), &(0x7f0000000240)='system_u:object_r:tpm_device_t:s0\x00', 0x22, 0x1) r3 = dup(r1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="15"], 0x6) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000001, 0x50, r3, 0x8) 12:49:42 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x32, &(0x7f0000000200)={0x77359400}, 0x10) 12:49:42 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='journal_checksum') close(r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = accept(r1, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x80) fsetxattr$security_selinux(r2, &(0x7f0000000140), &(0x7f0000000240)='system_u:object_r:tpm_device_t:s0\x00', 0x22, 0x1) r3 = dup(r1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="15"], 0x6) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000001, 0x50, r3, 0x8) 12:49:42 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='journal_checksum') close(r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = accept(r1, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x80) fsetxattr$security_selinux(r2, &(0x7f0000000140), &(0x7f0000000240)='system_u:object_r:tpm_device_t:s0\x00', 0x22, 0x1) r3 = dup(r1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="15"], 0x6) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000001, 0x50, r3, 0x8) 12:49:42 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='journal_checksum') close(r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = accept(r1, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x80) fsetxattr$security_selinux(r2, &(0x7f0000000140), &(0x7f0000000240)='system_u:object_r:tpm_device_t:s0\x00', 0x22, 0x1) r3 = dup(r1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="15"], 0x6) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000001, 0x50, r3, 0x8) 12:49:42 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x32, &(0x7f0000000200)={0x77359400}, 0x10) 12:49:43 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='journal_checksum') close(r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = accept(r1, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x80) fsetxattr$security_selinux(r2, &(0x7f0000000140), &(0x7f0000000240)='system_u:object_r:tpm_device_t:s0\x00', 0x22, 0x1) r3 = dup(r1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="15"], 0x6) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000001, 0x50, r3, 0x8) 12:49:43 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='journal_checksum') close(r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = accept(r1, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x80) fsetxattr$security_selinux(r2, &(0x7f0000000140), &(0x7f0000000240)='system_u:object_r:tpm_device_t:s0\x00', 0x22, 0x1) r3 = dup(r1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="15"], 0x6) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000001, 0x50, r3, 0x8) 12:49:43 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='journal_checksum') close(r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = accept(r1, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x80) fsetxattr$security_selinux(r2, &(0x7f0000000140), &(0x7f0000000240)='system_u:object_r:tpm_device_t:s0\x00', 0x22, 0x1) r3 = dup(r1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="15"], 0x6) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000001, 0x50, r3, 0x8) 12:49:43 executing program 6: r0 = getpgrp(0x0) setpriority(0x0, r0, 0x0) 12:49:43 executing program 7: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)={0x28, r0, 0xc0822a29f05aae81, 0x0, 0x0, {{0x55}, {@val={0x8, 0x1, 0x13}, @void, @val={0xc, 0x99, {0x1}}}}}, 0x28}}, 0x0) 12:49:43 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:sendmail_exec_t:s0\x00', 0x25) 12:49:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d97aa1", 0xe}, {&(0x7f0000000100)="9f", 0x1}, {&(0x7f00000002c0)='^', 0x1}], 0x3, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000001c0)) sendfile(r3, r0, 0x0, 0xfffffdef) [ 134.143145] audit: type=1400 audit(1663332583.326:10): avc: denied { create } for pid=4060 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:sendmail_exec_t:s0 tclass=key permissive=1 12:49:43 executing program 2: mq_open(&(0x7f0000006780)=',#@},$!\'--\x00', 0x40, 0x0, &(0x7f00000067c0)={0xfffffffffffffeff, 0x7fe000000, 0x3, 0x80}) [ 134.170931] loop5: detected capacity change from 0 to 40 12:49:43 executing program 7: perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002940)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:49:43 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='journal_checksum') close(r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = accept(r1, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x80) fsetxattr$security_selinux(r2, &(0x7f0000000140), &(0x7f0000000240)='system_u:object_r:tpm_device_t:s0\x00', 0x22, 0x1) r3 = dup(r1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="15"], 0x6) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000001, 0x50, r3, 0x8) 12:49:43 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000017ffde00", @ANYBLOB='B\x00\x00\x00\x00\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xf523}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0x2) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x1, 0x1f, 0xec, 0x1, 0x0, 0x4, 0xa0053, 0x11, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x401, 0x1}, 0x2000, 0x0, 0xffffff84, 0x0, 0xed2, 0x101, 0x1, 0x0, 0x0, 0x0, 0x6287}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000340)) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000240)={0x1, 0x0, 0xa}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fallocate(r2, 0xb, 0x0, 0x101) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 12:49:43 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='journal_checksum') close(r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = accept(r1, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x80) fsetxattr$security_selinux(r2, &(0x7f0000000140), &(0x7f0000000240)='system_u:object_r:tpm_device_t:s0\x00', 0x22, 0x1) r3 = dup(r1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="15"], 0x6) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000001, 0x50, r3, 0x8) 12:49:43 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:sendmail_exec_t:s0\x00', 0x25) [ 134.290871] ------------[ cut here ]------------ [ 134.290898] [ 134.290902] ====================================================== [ 134.290905] WARNING: possible circular locking dependency detected [ 134.290909] 6.0.0-rc5-next-20220916 #1 Tainted: G W [ 134.290917] ------------------------------------------------------ [ 134.290920] syz-executor.6/4074 is trying to acquire lock: [ 134.290926] ffffffff853fa878 ((console_sem).lock){-...}-{2:2}, at: down_trylock+0xe/0x70 [ 134.290961] [ 134.290961] but task is already holding lock: [ 134.290964] ffff888017466020 (&ctx->lock){-...}-{2:2}, at: perf_event_task_tick+0x1ce/0x1050 [ 134.290987] [ 134.290987] which lock already depends on the new lock. [ 134.290987] [ 134.290990] [ 134.290990] the existing dependency chain (in reverse order) is: [ 134.290993] [ 134.290993] -> #3 (&ctx->lock){-...}-{2:2}: [ 134.291006] _raw_spin_lock+0x2a/0x40 [ 134.291022] __perf_event_task_sched_out+0x53b/0x18d0 [ 134.291033] __schedule+0xedd/0x2470 [ 134.291043] schedule+0xda/0x1b0 [ 134.291052] futex_wait_queue+0xf5/0x1e0 [ 134.291062] futex_wait+0x28e/0x690 [ 134.291070] do_futex+0x2ff/0x380 [ 134.291078] __x64_sys_futex+0x1c6/0x4d0 [ 134.291087] do_syscall_64+0x3b/0x90 [ 134.291100] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 134.291115] [ 134.291115] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 134.291127] _raw_spin_lock_nested+0x30/0x40 [ 134.291141] raw_spin_rq_lock_nested+0x1e/0x30 [ 134.291152] task_fork_fair+0x63/0x4d0 [ 134.291167] sched_cgroup_fork+0x3d0/0x540 [ 134.291179] copy_process+0x4183/0x6e20 [ 134.291188] kernel_clone+0xe7/0x890 [ 134.291197] user_mode_thread+0xad/0xf0 [ 134.291206] rest_init+0x24/0x250 [ 134.291220] arch_call_rest_init+0xf/0x14 [ 134.291231] start_kernel+0x4c1/0x4e6 [ 134.291240] secondary_startup_64_no_verify+0xe0/0xeb [ 134.291253] [ 134.291253] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 134.291266] _raw_spin_lock_irqsave+0x39/0x60 [ 134.291279] try_to_wake_up+0xab/0x1920 [ 134.291290] up+0x75/0xb0 [ 134.291300] __up_console_sem+0x6e/0x80 [ 134.291314] console_unlock+0x46a/0x590 [ 134.291328] vt_ioctl+0x2822/0x2ca0 [ 134.291339] tty_ioctl+0x7c4/0x1700 [ 134.291350] __x64_sys_ioctl+0x19a/0x210 [ 134.291364] do_syscall_64+0x3b/0x90 [ 134.291375] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 134.291405] [ 134.291405] -> #0 ((console_sem).lock){-...}-{2:2}: [ 134.291418] __lock_acquire+0x2a02/0x5e70 [ 134.291432] lock_acquire+0x1a2/0x530 [ 134.291446] _raw_spin_lock_irqsave+0x39/0x60 [ 134.291459] down_trylock+0xe/0x70 [ 134.291470] __down_trylock_console_sem+0x3b/0xd0 [ 134.291484] vprintk_emit+0x16b/0x560 [ 134.291498] vprintk+0x84/0xa0 [ 134.291512] _printk+0xba/0xf1 [ 134.291528] report_bug.cold+0x72/0xab [ 134.291539] handle_bug+0x3c/0x70 [ 134.291550] exc_invalid_op+0x14/0x50 [ 134.291562] asm_exc_invalid_op+0x16/0x20 [ 134.291577] perf_event_task_tick+0xbeb/0x1050 [ 134.291586] scheduler_tick+0x17e/0x350 [ 134.291598] update_process_times+0x138/0x190 [ 134.291609] tick_sched_handle+0x9b/0x180 [ 134.291623] tick_sched_timer+0xf2/0x120 [ 134.291637] __hrtimer_run_queues+0x1ca/0xbd0 [ 134.291647] hrtimer_interrupt+0x315/0x770 [ 134.291657] __sysvec_apic_timer_interrupt+0x144/0x500 [ 134.291675] sysvec_apic_timer_interrupt+0x89/0xc0 [ 134.291690] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 134.291706] __find_get_block+0x20b/0xc00 [ 134.291719] __getblk_gfp+0x28/0x80 [ 134.291730] ext4_read_inode_bitmap+0x28e/0x1640 [ 134.291743] __ext4_new_inode+0x1417/0x55f0 [ 134.291755] ext4_create+0x2e0/0x4e0 [ 134.291768] lookup_open.isra.0+0xeee/0x1270 [ 134.291777] path_openat+0x964/0x2800 [ 134.291787] do_filp_open+0x1b6/0x410 [ 134.291797] do_sys_openat2+0x171/0x4c0 [ 134.291810] __x64_sys_openat+0x13f/0x1f0 [ 134.291823] do_syscall_64+0x3b/0x90 [ 134.291835] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 134.291850] [ 134.291850] other info that might help us debug this: [ 134.291850] [ 134.291852] Chain exists of: [ 134.291852] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 134.291852] [ 134.291866] Possible unsafe locking scenario: [ 134.291866] [ 134.291868] CPU0 CPU1 [ 134.291871] ---- ---- [ 134.291872] lock(&ctx->lock); [ 134.291877] lock(&rq->__lock); [ 134.291883] lock(&ctx->lock); [ 134.291889] lock((console_sem).lock); [ 134.291894] [ 134.291894] *** DEADLOCK *** [ 134.291894] [ 134.291896] 3 locks held by syz-executor.6/4074: [ 134.291902] #0: ffff888010096438 (sb_writers#3){.+.+}-{0:0}, at: path_openat+0x27ac/0x2800 [ 134.291929] #1: ffff88801e2cdd70 (&type->i_mutex_dir_key#3){++++}-{3:3}, at: path_openat+0x8fb/0x2800 [ 134.291955] #2: ffff888017466020 (&ctx->lock){-...}-{2:2}, at: perf_event_task_tick+0x1ce/0x1050 [ 134.291979] [ 134.291979] stack backtrace: [ 134.291982] CPU: 0 PID: 4074 Comm: syz-executor.6 Tainted: G W 6.0.0-rc5-next-20220916 #1 [ 134.291995] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 134.292002] Call Trace: [ 134.292006] [ 134.292010] dump_stack_lvl+0x8b/0xb3 [ 134.292024] check_noncircular+0x263/0x2e0 [ 134.292038] ? format_decode+0x26c/0xb50 [ 134.292052] ? print_circular_bug+0x450/0x450 [ 134.292067] ? enable_ptr_key_workfn+0x20/0x20 [ 134.292080] ? __kernel_text_address+0x9/0x40 [ 134.292093] ? format_decode+0x26c/0xb50 [ 134.292107] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 134.292123] __lock_acquire+0x2a02/0x5e70 [ 134.292142] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 134.292162] lock_acquire+0x1a2/0x530 [ 134.292177] ? down_trylock+0xe/0x70 [ 134.292190] ? rcu_read_unlock+0x40/0x40 [ 134.292206] ? lock_chain_count+0x20/0x20 [ 134.292222] ? vprintk+0x84/0xa0 [ 134.292238] _raw_spin_lock_irqsave+0x39/0x60 [ 134.292252] ? down_trylock+0xe/0x70 [ 134.292264] down_trylock+0xe/0x70 [ 134.292276] ? vprintk+0x84/0xa0 [ 134.292290] __down_trylock_console_sem+0x3b/0xd0 [ 134.292306] vprintk_emit+0x16b/0x560 [ 134.292322] vprintk+0x84/0xa0 [ 134.292337] _printk+0xba/0xf1 [ 134.292353] ? record_print_text.cold+0x16/0x16 [ 134.292373] ? report_bug.cold+0x66/0xab [ 134.292386] ? perf_event_task_tick+0xbeb/0x1050 [ 134.292397] report_bug.cold+0x72/0xab [ 134.292411] handle_bug+0x3c/0x70 [ 134.292423] exc_invalid_op+0x14/0x50 [ 134.292436] asm_exc_invalid_op+0x16/0x20 [ 134.292452] RIP: 0010:perf_event_task_tick+0xbeb/0x1050 [ 134.292464] Code: e9 34 fd ff ff e8 75 3b ef ff 65 44 8b 35 e9 99 ab 7e 31 ff 44 89 f6 e8 13 38 ef ff 45 85 f6 0f 84 04 01 00 00 e8 55 3b ef ff <0f> 0b e9 60 fa ff ff e8 49 3b ef ff 65 8b 1d be 99 ab 7e 31 ff 89 [ 134.292475] RSP: 0018:ffff88806ce09cf0 EFLAGS: 00010046 [ 134.292483] RAX: 0000000000010001 RBX: ffff888008665c80 RCX: 0000000000000000 [ 134.292491] RDX: ffff88801b7a3580 RSI: ffffffff8156dbeb RDI: 0000000000000005 [ 134.292498] RBP: ffff888017466108 R08: 0000000000000005 R09: 0000000000000001 [ 134.292504] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888008665d18 [ 134.292511] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 134.292521] ? perf_event_task_tick+0xbeb/0x1050 [ 134.292537] scheduler_tick+0x17e/0x350 [ 134.292552] update_process_times+0x138/0x190 [ 134.292562] ? tick_sched_do_timer+0x174/0x470 [ 134.292578] tick_sched_handle+0x9b/0x180 [ 134.292592] ? tick_sched_do_timer+0x470/0x470 [ 134.292607] tick_sched_timer+0xf2/0x120 [ 134.292621] ? tick_sched_do_timer+0x470/0x470 [ 134.292637] __hrtimer_run_queues+0x1ca/0xbd0 [ 134.292652] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 134.292664] ? ktime_get_update_offsets_now+0x256/0x360 [ 134.292681] hrtimer_interrupt+0x315/0x770 [ 134.292696] __sysvec_apic_timer_interrupt+0x144/0x500 [ 134.292715] sysvec_apic_timer_interrupt+0x89/0xc0 [ 134.292730] [ 134.292733] [ 134.292737] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 134.292753] RIP: 0010:__find_get_block+0x20b/0xc00 [ 134.292767] Code: 1b 42 b8 ff 49 8d 7f 60 be 04 00 00 00 e8 dd c2 ea ff f0 41 ff 47 60 eb 03 45 31 ed e8 fe 41 b8 ff e8 59 1a bf ff fb 4d 85 ed <0f> 84 7d 01 00 00 e8 ea 41 b8 ff 0f 1f 44 00 00 e8 e0 41 b8 ff 65 [ 134.292776] RSP: 0018:ffff888041e1f568 EFLAGS: 00000286 [ 134.292784] RAX: 00000000000007ab RBX: 0000000000000000 RCX: ffffffff812999ff [ 134.292791] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 134.292797] RBP: 0000000000034cc0 R08: 0000000000000001 R09: ffffffff86ccb81f [ 134.292804] R10: fffffbfff0d99703 R11: 0000000000000001 R12: 0000000000000112 [ 134.292811] R13: ffff888017e70488 R14: 0000000000000112 R15: ffff888017e70488 [ 134.292821] ? mark_lock.part.0+0xef/0x2f70 [ 134.292838] ? __find_get_block+0x207/0xc00 [ 134.292853] __getblk_gfp+0x28/0x80 [ 134.292866] ext4_read_inode_bitmap+0x28e/0x1640 [ 134.292881] __ext4_new_inode+0x1417/0x55f0 [ 134.292899] ? ext4_mark_inode_used+0x1490/0x1490 [ 134.292912] ? avc_has_perm+0xc5/0x1b0 [ 134.292936] ext4_create+0x2e0/0x4e0 [ 134.292952] ? ext4_symlink+0x9a0/0x9a0 [ 134.292968] ? ext4_symlink+0x9a0/0x9a0 [ 134.292982] lookup_open.isra.0+0xeee/0x1270 [ 134.292995] ? lookup_fast+0x530/0x530 [ 134.293014] path_openat+0x964/0x2800 [ 134.293027] ? path_lookupat+0x850/0x850 [ 134.293041] do_filp_open+0x1b6/0x410 [ 134.293052] ? may_open_dev+0xf0/0xf0 [ 134.293063] ? find_held_lock+0x2c/0x110 [ 134.293078] ? lock_release+0x3b2/0x750 [ 134.293093] ? do_raw_spin_lock+0x121/0x260 [ 134.293110] ? rwlock_bug.part.0+0x90/0x90 [ 134.293126] ? _find_next_bit+0x1e5/0x260 [ 134.293143] ? _raw_spin_unlock+0x24/0x40 [ 134.293157] ? alloc_fd+0x2f0/0x700 [ 134.293173] do_sys_openat2+0x171/0x4c0 [ 134.293187] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 134.293204] ? syscall_enter_from_user_mode+0x18/0x50 [ 134.293220] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 134.293238] ? build_open_flags+0x6f0/0x6f0 [ 134.293253] ? perf_trace_preemptirq_template+0x274/0x420 [ 134.293272] __x64_sys_openat+0x13f/0x1f0 [ 134.293286] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 134.293302] ? syscall_enter_from_user_mode+0x1d/0x50 [ 134.293318] ? syscall_enter_from_user_mode+0x1d/0x50 [ 134.293336] do_syscall_64+0x3b/0x90 [ 134.293349] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 134.293365] RIP: 0033:0x7f950e7c5b19 [ 134.293374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.293384] RSP: 002b:00007f950bd3b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 134.293394] RAX: ffffffffffffffda RBX: 00007f950e8d8f60 RCX: 00007f950e7c5b19 [ 134.293401] RDX: 0000000000101042 RSI: 0000000020000100 RDI: ffffffffffffff9c [ 134.293408] RBP: 00007f950e81ff6d R08: 0000000000000000 R09: 0000000000000000 [ 134.293415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 134.293421] R13: 00007ffe9d9185af R14: 00007f950bd3b300 R15: 0000000000022000 [ 134.293433] [ 134.369308] WARNING: CPU: 0 PID: 4074 at kernel/events/core.c:2233 perf_event_task_tick+0xbeb/0x1050 [ 134.370007] Modules linked in: [ 134.370265] CPU: 0 PID: 4074 Comm: syz-executor.6 Tainted: G W 6.0.0-rc5-next-20220916 #1 [ 134.370994] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 134.371852] RIP: 0010:perf_event_task_tick+0xbeb/0x1050 [ 134.372245] Code: e9 34 fd ff ff e8 75 3b ef ff 65 44 8b 35 e9 99 ab 7e 31 ff 44 89 f6 e8 13 38 ef ff 45 85 f6 0f 84 04 01 00 00 e8 55 3b ef ff <0f> 0b e9 60 fa ff ff e8 49 3b ef ff 65 8b 1d be 99 ab 7e 31 ff 89 [ 134.373582] RSP: 0018:ffff88806ce09cf0 EFLAGS: 00010046 [ 134.373974] RAX: 0000000000010001 RBX: ffff888008665c80 RCX: 0000000000000000 [ 134.374496] RDX: ffff88801b7a3580 RSI: ffffffff8156dbeb RDI: 0000000000000005 [ 134.374841] hrtimer: interrupt took 17803 ns [ 134.375021] RBP: ffff888017466108 R08: 0000000000000005 R09: 0000000000000001 [ 134.375030] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888008665d18 [ 134.376740] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 134.377281] FS: 00007f950bd3b700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 134.377894] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 134.378343] CR2: 00007f74d7ef2b42 CR3: 000000000e430000 CR4: 0000000000350ef0 [ 134.378867] Call Trace: [ 134.379062] [ 134.379228] scheduler_tick+0x17e/0x350 [ 134.379538] update_process_times+0x138/0x190 [ 134.379874] ? tick_sched_do_timer+0x174/0x470 [ 134.380219] tick_sched_handle+0x9b/0x180 [ 134.380533] ? tick_sched_do_timer+0x470/0x470 [ 134.380883] tick_sched_timer+0xf2/0x120 [ 134.381191] ? tick_sched_do_timer+0x470/0x470 [ 134.381543] __hrtimer_run_queues+0x1ca/0xbd0 [ 134.381897] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 134.382301] ? ktime_get_update_offsets_now+0x256/0x360 [ 134.382725] hrtimer_interrupt+0x315/0x770 [ 134.383062] __sysvec_apic_timer_interrupt+0x144/0x500 [ 134.383475] sysvec_apic_timer_interrupt+0x89/0xc0 [ 134.383842] [ 134.384014] [ 134.384186] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 134.384587] RIP: 0010:__find_get_block+0x20b/0xc00 [ 134.384978] Code: 1b 42 b8 ff 49 8d 7f 60 be 04 00 00 00 e8 dd c2 ea ff f0 41 ff 47 60 eb 03 45 31 ed e8 fe 41 b8 ff e8 59 1a bf ff fb 4d 85 ed <0f> 84 7d 01 00 00 e8 ea 41 b8 ff 0f 1f 44 00 00 e8 e0 41 b8 ff 65 [ 134.386374] RSP: 0018:ffff888041e1f568 EFLAGS: 00000286 [ 134.386776] RAX: 00000000000007ab RBX: 0000000000000000 RCX: ffffffff812999ff [ 134.387298] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 134.387830] RBP: 0000000000034cc0 R08: 0000000000000001 R09: ffffffff86ccb81f [ 134.388362] R10: fffffbfff0d99703 R11: 0000000000000001 R12: 0000000000000112 [ 134.388893] R13: ffff888017e70488 R14: 0000000000000112 R15: ffff888017e70488 [ 134.389443] ? mark_lock.part.0+0xef/0x2f70 [ 134.389782] ? __find_get_block+0x207/0xc00 [ 134.390124] __getblk_gfp+0x28/0x80 [ 134.390415] ext4_read_inode_bitmap+0x28e/0x1640 [ 134.390787] __ext4_new_inode+0x1417/0x55f0 [ 134.391130] ? ext4_mark_inode_used+0x1490/0x1490 [ 134.391519] ? avc_has_perm+0xc5/0x1b0 [ 134.391842] ext4_create+0x2e0/0x4e0 [ 134.392139] ? ext4_symlink+0x9a0/0x9a0 [ 134.392455] ? ext4_symlink+0x9a0/0x9a0 [ 134.392771] lookup_open.isra.0+0xeee/0x1270 [ 134.393109] ? lookup_fast+0x530/0x530 [ 134.393415] path_openat+0x964/0x2800 [ 134.393706] ? path_lookupat+0x850/0x850 [ 134.394016] do_filp_open+0x1b6/0x410 [ 134.394306] ? may_open_dev+0xf0/0xf0 [ 134.394595] ? find_held_lock+0x2c/0x110 [ 134.394906] ? lock_release+0x3b2/0x750 [ 134.395220] ? do_raw_spin_lock+0x121/0x260 [ 134.395584] ? rwlock_bug.part.0+0x90/0x90 [ 134.395918] ? _find_next_bit+0x1e5/0x260 [ 134.396250] ? _raw_spin_unlock+0x24/0x40 [ 134.396585] ? alloc_fd+0x2f0/0x700 [ 134.396883] do_sys_openat2+0x171/0x4c0 [ 134.397197] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 134.397598] ? syscall_enter_from_user_mode+0x18/0x50 [ 134.398007] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 134.398408] ? build_open_flags+0x6f0/0x6f0 [ 134.398758] ? perf_trace_preemptirq_template+0x274/0x420 [ 134.399181] __x64_sys_openat+0x13f/0x1f0 [ 134.399507] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 134.399878] ? syscall_enter_from_user_mode+0x1d/0x50 [ 134.400269] ? syscall_enter_from_user_mode+0x1d/0x50 [ 134.400662] do_syscall_64+0x3b/0x90 [ 134.400950] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 134.401339] RIP: 0033:0x7f950e7c5b19 [ 134.401627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.402954] RSP: 002b:00007f950bd3b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 134.403540] RAX: ffffffffffffffda RBX: 00007f950e8d8f60 RCX: 00007f950e7c5b19 [ 134.404095] RDX: 0000000000101042 RSI: 0000000020000100 RDI: ffffffffffffff9c [ 134.404638] RBP: 00007f950e81ff6d R08: 0000000000000000 R09: 0000000000000000 [ 134.405164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 134.405689] R13: 00007ffe9d9185af R14: 00007f950bd3b300 R15: 0000000000022000 [ 134.406234] [ 134.406420] irq event stamp: 1966 [ 134.406688] hardirqs last enabled at (1965): [] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 134.407442] hardirqs last disabled at (1966): [] sysvec_apic_timer_interrupt+0xb/0xc0 [ 134.408166] softirqs last enabled at (1726): [] __irq_exit_rcu+0x11b/0x180 [ 134.408806] softirqs last disabled at (1571): [] __irq_exit_rcu+0x11b/0x180 [ 134.409437] ---[ end trace 0000000000000000 ]--- [ 134.509621] syz-executor.5: attempt to access beyond end of device [ 134.509621] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 134.511657] Buffer I/O error on dev loop5, logical block 10, lost async page write 12:49:43 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:sendmail_exec_t:s0\x00', 0x25) 12:49:43 executing program 1: mlock2(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) madvise(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x8) 12:49:43 executing program 2: mq_notify(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, 0x4}) 12:49:43 executing program 4: perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002940)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:49:43 executing program 7: perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002940)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:49:43 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)='journal_checksum') close(r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = accept(r1, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000000)=0x80) fsetxattr$security_selinux(r2, &(0x7f0000000140), &(0x7f0000000240)='system_u:object_r:tpm_device_t:s0\x00', 0x22, 0x1) r3 = dup(r1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="15"], 0x6) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000001, 0x50, r3, 0x8) 12:49:43 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000017ffde00", @ANYBLOB='B\x00\x00\x00\x00\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xf523}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0x2) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x1, 0x1f, 0xec, 0x1, 0x0, 0x4, 0xa0053, 0x11, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x401, 0x1}, 0x2000, 0x0, 0xffffff84, 0x0, 0xed2, 0x101, 0x1, 0x0, 0x0, 0x0, 0x6287}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000340)) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000240)={0x1, 0x0, 0xa}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fallocate(r2, 0xb, 0x0, 0x101) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 12:49:43 executing program 7: perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002940)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:49:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d97aa1", 0xe}, {&(0x7f0000000100)="9f", 0x1}, {&(0x7f00000002c0)='^', 0x1}], 0x3, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000001c0)) sendfile(r3, r0, 0x0, 0xfffffdef) 12:49:43 executing program 7: perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002940)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:49:43 executing program 4: perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002940)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:49:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000017ffde00", @ANYBLOB='B\x00\x00\x00\x00\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xf523}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0x2) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x1, 0x1f, 0xec, 0x1, 0x0, 0x4, 0xa0053, 0x11, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x401, 0x1}, 0x2000, 0x0, 0xffffff84, 0x0, 0xed2, 0x101, 0x1, 0x0, 0x0, 0x0, 0x6287}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000340)) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000240)={0x1, 0x0, 0xa}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fallocate(r2, 0xb, 0x0, 0x101) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 12:49:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d97aa1", 0xe}, {&(0x7f0000000100)="9f", 0x1}, {&(0x7f00000002c0)='^', 0x1}], 0x3, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000001c0)) sendfile(r3, r0, 0x0, 0xfffffdef) [ 134.755275] loop5: detected capacity change from 0 to 40 12:49:43 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:sendmail_exec_t:s0\x00', 0x25) 12:49:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(r3, &(0x7f0000000080)="01", 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) [ 134.827344] loop1: detected capacity change from 0 to 40 12:49:44 executing program 7: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x10) 12:49:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000017ffde00", @ANYBLOB='B\x00\x00\x00\x00\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xf523}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0x2) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x1, 0x1f, 0xec, 0x1, 0x0, 0x4, 0xa0053, 0x11, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x401, 0x1}, 0x2000, 0x0, 0xffffff84, 0x0, 0xed2, 0x101, 0x1, 0x0, 0x0, 0x0, 0x6287}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000340)) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000240)={0x1, 0x0, 0xa}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fallocate(r2, 0xb, 0x0, 0x101) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 12:49:44 executing program 4: perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002940)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 134.930454] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 134.931223] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 134.931763] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 134.932285] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 134.932882] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 4 prio class 2 [ 134.935852] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.936276] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.936910] Buffer I/O error on dev sr0, logical block 0, async page read [ 134.937685] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.938247] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.938905] Buffer I/O error on dev sr0, logical block 1, async page read [ 134.939675] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.940117] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.940764] Buffer I/O error on dev sr0, logical block 2, async page read [ 134.941542] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.941984] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.942623] Buffer I/O error on dev sr0, logical block 3, async page read [ 134.943424] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.943879] I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.944499] Buffer I/O error on dev sr0, logical block 4, async page read [ 134.945378] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.945792] I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.946461] Buffer I/O error on dev sr0, logical block 5, async page read [ 134.947346] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.947767] I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.948405] Buffer I/O error on dev sr0, logical block 6, async page read [ 134.949218] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 134.949633] I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 134.950280] Buffer I/O error on dev sr0, logical block 7, async page read 12:49:44 executing program 3: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae', 0x0) r1 = memfd_create(&(0x7f0000002800)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1,\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\x06\x00\xff\x1a\x8e\xe2ae\x1e=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae\xc0\xa6d\x12\'y\x11Zcu\xe7\xc4{\\0Y[\xdf\x96\xbf\x97\xa7CS\xfe$\xeb\xac\x9a\xa9\x7f\x85G\xa2\xc8mt\x8fs-\xae\xc6\xd4\x8a|I\xe3\xfe\x04%\x1b\xd8F\xa9\x9f\x96?L\xb7MGE\xbf\x1b\xf8\t\f_\xa0j\x9e\xadM\xa4\xc8\xba\xdc\xabzO8\xeb#\xdc\x1e\v_\v\xc0\xbc\\r`\x8b\x11z\xbb\x89$\xe9t\x8c+6l\f\xd0\x0e\xd0K\x16C\xc8ty\x97\x8ev\x15\xe6\x8a\xc4p\xeb\xe5!\xcfS\x95\xe6\xfa\xb4+C\xc3\x01I\x1f\xea\xc27\xff\x9c\x13\xeed\xed8\xbfR\x01&\xe0@Y\xc9\xe6GL\xd5?\x03', 0x0) ftruncate(r1, 0x2000000) sendfile(r0, r1, 0x0, 0x7fff) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000280)=""/188, 0xbc}], 0x1, 0x1, 0x0) [ 135.055198] syz-executor.5: attempt to access beyond end of device [ 135.055198] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 135.056305] Buffer I/O error on dev loop5, logical block 10, lost async page write [ 135.145686] syz-executor.1: attempt to access beyond end of device [ 135.145686] loop1: rw=2049, sector=40, nr_sectors = 4 limit=40 12:49:44 executing program 3: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae', 0x0) r1 = memfd_create(&(0x7f0000002800)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1,\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\x06\x00\xff\x1a\x8e\xe2ae\x1e=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae\xc0\xa6d\x12\'y\x11Zcu\xe7\xc4{\\0Y[\xdf\x96\xbf\x97\xa7CS\xfe$\xeb\xac\x9a\xa9\x7f\x85G\xa2\xc8mt\x8fs-\xae\xc6\xd4\x8a|I\xe3\xfe\x04%\x1b\xd8F\xa9\x9f\x96?L\xb7MGE\xbf\x1b\xf8\t\f_\xa0j\x9e\xadM\xa4\xc8\xba\xdc\xabzO8\xeb#\xdc\x1e\v_\v\xc0\xbc\\r`\x8b\x11z\xbb\x89$\xe9t\x8c+6l\f\xd0\x0e\xd0K\x16C\xc8ty\x97\x8ev\x15\xe6\x8a\xc4p\xeb\xe5!\xcfS\x95\xe6\xfa\xb4+C\xc3\x01I\x1f\xea\xc27\xff\x9c\x13\xeed\xed8\xbfR\x01&\xe0@Y\xc9\xe6GL\xd5?\x03', 0x0) ftruncate(r1, 0x2000000) sendfile(r0, r1, 0x0, 0x7fff) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000280)=""/188, 0xbc}], 0x1, 0x1, 0x0) 12:49:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000017ffde00", @ANYBLOB='B\x00\x00\x00\x00\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xf523}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0x2) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x1, 0x1f, 0xec, 0x1, 0x0, 0x4, 0xa0053, 0x11, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x401, 0x1}, 0x2000, 0x0, 0xffffff84, 0x0, 0xed2, 0x101, 0x1, 0x0, 0x0, 0x0, 0x6287}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000340)) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000240)={0x1, 0x0, 0xa}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fallocate(r2, 0xb, 0x0, 0x101) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 12:49:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d97aa1", 0xe}, {&(0x7f0000000100)="9f", 0x1}, {&(0x7f00000002c0)='^', 0x1}], 0x3, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000001c0)) sendfile(r3, r0, 0x0, 0xfffffdef) 12:49:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000017ffde00", @ANYBLOB='B\x00\x00\x00\x00\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xf523}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0x2) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x1, 0x1f, 0xec, 0x1, 0x0, 0x4, 0xa0053, 0x11, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x401, 0x1}, 0x2000, 0x0, 0xffffff84, 0x0, 0xed2, 0x101, 0x1, 0x0, 0x0, 0x0, 0x6287}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000340)) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000240)={0x1, 0x0, 0xa}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fallocate(r2, 0xb, 0x0, 0x101) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 12:49:44 executing program 4: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae', 0x0) r1 = memfd_create(&(0x7f0000002800)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1,\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\x06\x00\xff\x1a\x8e\xe2ae\x1e=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae\xc0\xa6d\x12\'y\x11Zcu\xe7\xc4{\\0Y[\xdf\x96\xbf\x97\xa7CS\xfe$\xeb\xac\x9a\xa9\x7f\x85G\xa2\xc8mt\x8fs-\xae\xc6\xd4\x8a|I\xe3\xfe\x04%\x1b\xd8F\xa9\x9f\x96?L\xb7MGE\xbf\x1b\xf8\t\f_\xa0j\x9e\xadM\xa4\xc8\xba\xdc\xabzO8\xeb#\xdc\x1e\v_\v\xc0\xbc\\r`\x8b\x11z\xbb\x89$\xe9t\x8c+6l\f\xd0\x0e\xd0K\x16C\xc8ty\x97\x8ev\x15\xe6\x8a\xc4p\xeb\xe5!\xcfS\x95\xe6\xfa\xb4+C\xc3\x01I\x1f\xea\xc27\xff\x9c\x13\xeed\xed8\xbfR\x01&\xe0@Y\xc9\xe6GL\xd5?\x03', 0x0) ftruncate(r1, 0x2000000) sendfile(r0, r1, 0x0, 0x7fff) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000280)=""/188, 0xbc}], 0x1, 0x1, 0x0) [ 135.267472] loop5: detected capacity change from 0 to 40 12:49:44 executing program 3: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae', 0x0) r1 = memfd_create(&(0x7f0000002800)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1,\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\x06\x00\xff\x1a\x8e\xe2ae\x1e=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae\xc0\xa6d\x12\'y\x11Zcu\xe7\xc4{\\0Y[\xdf\x96\xbf\x97\xa7CS\xfe$\xeb\xac\x9a\xa9\x7f\x85G\xa2\xc8mt\x8fs-\xae\xc6\xd4\x8a|I\xe3\xfe\x04%\x1b\xd8F\xa9\x9f\x96?L\xb7MGE\xbf\x1b\xf8\t\f_\xa0j\x9e\xadM\xa4\xc8\xba\xdc\xabzO8\xeb#\xdc\x1e\v_\v\xc0\xbc\\r`\x8b\x11z\xbb\x89$\xe9t\x8c+6l\f\xd0\x0e\xd0K\x16C\xc8ty\x97\x8ev\x15\xe6\x8a\xc4p\xeb\xe5!\xcfS\x95\xe6\xfa\xb4+C\xc3\x01I\x1f\xea\xc27\xff\x9c\x13\xeed\xed8\xbfR\x01&\xe0@Y\xc9\xe6GL\xd5?\x03', 0x0) ftruncate(r1, 0x2000000) sendfile(r0, r1, 0x0, 0x7fff) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000280)=""/188, 0xbc}], 0x1, 0x1, 0x0) 12:49:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(r3, &(0x7f0000000080)="01", 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) 12:49:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d97aa1", 0xe}, {&(0x7f0000000100)="9f", 0x1}, {&(0x7f00000002c0)='^', 0x1}], 0x3, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000001c0)) sendfile(r3, r0, 0x0, 0xfffffdef) 12:49:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(r3, &(0x7f0000000080)="01", 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) [ 135.323966] loop1: detected capacity change from 0 to 40 [ 135.344480] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 135.345149] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 135.345636] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 135.346102] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 135.346613] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 3 prio class 2 [ 135.347929] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.348567] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.349115] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.349728] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.350266] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.350871] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.351399] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.352021] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 12:49:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(r3, &(0x7f0000000080)="01", 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) 12:49:44 executing program 3: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae', 0x0) r1 = memfd_create(&(0x7f0000002800)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1,\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\x06\x00\xff\x1a\x8e\xe2ae\x1e=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae\xc0\xa6d\x12\'y\x11Zcu\xe7\xc4{\\0Y[\xdf\x96\xbf\x97\xa7CS\xfe$\xeb\xac\x9a\xa9\x7f\x85G\xa2\xc8mt\x8fs-\xae\xc6\xd4\x8a|I\xe3\xfe\x04%\x1b\xd8F\xa9\x9f\x96?L\xb7MGE\xbf\x1b\xf8\t\f_\xa0j\x9e\xadM\xa4\xc8\xba\xdc\xabzO8\xeb#\xdc\x1e\v_\v\xc0\xbc\\r`\x8b\x11z\xbb\x89$\xe9t\x8c+6l\f\xd0\x0e\xd0K\x16C\xc8ty\x97\x8ev\x15\xe6\x8a\xc4p\xeb\xe5!\xcfS\x95\xe6\xfa\xb4+C\xc3\x01I\x1f\xea\xc27\xff\x9c\x13\xeed\xed8\xbfR\x01&\xe0@Y\xc9\xe6GL\xd5?\x03', 0x0) ftruncate(r1, 0x2000000) sendfile(r0, r1, 0x0, 0x7fff) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000280)=""/188, 0xbc}], 0x1, 0x1, 0x0) [ 135.465693] syz-executor.1: attempt to access beyond end of device [ 135.465693] loop1: rw=2049, sector=40, nr_sectors = 4 limit=40 12:49:44 executing program 4: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae', 0x0) r1 = memfd_create(&(0x7f0000002800)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1,\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\x06\x00\xff\x1a\x8e\xe2ae\x1e=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae\xc0\xa6d\x12\'y\x11Zcu\xe7\xc4{\\0Y[\xdf\x96\xbf\x97\xa7CS\xfe$\xeb\xac\x9a\xa9\x7f\x85G\xa2\xc8mt\x8fs-\xae\xc6\xd4\x8a|I\xe3\xfe\x04%\x1b\xd8F\xa9\x9f\x96?L\xb7MGE\xbf\x1b\xf8\t\f_\xa0j\x9e\xadM\xa4\xc8\xba\xdc\xabzO8\xeb#\xdc\x1e\v_\v\xc0\xbc\\r`\x8b\x11z\xbb\x89$\xe9t\x8c+6l\f\xd0\x0e\xd0K\x16C\xc8ty\x97\x8ev\x15\xe6\x8a\xc4p\xeb\xe5!\xcfS\x95\xe6\xfa\xb4+C\xc3\x01I\x1f\xea\xc27\xff\x9c\x13\xeed\xed8\xbfR\x01&\xe0@Y\xc9\xe6GL\xd5?\x03', 0x0) ftruncate(r1, 0x2000000) sendfile(r0, r1, 0x0, 0x7fff) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000280)=""/188, 0xbc}], 0x1, 0x1, 0x0) 12:49:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d97aa1", 0xe}, {&(0x7f0000000100)="9f", 0x1}, {&(0x7f00000002c0)='^', 0x1}], 0x3, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000001c0)) sendfile(r3, r0, 0x0, 0xfffffdef) [ 135.574641] loop1: detected capacity change from 0 to 40 12:49:44 executing program 4: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae', 0x0) r1 = memfd_create(&(0x7f0000002800)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1,\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\x06\x00\xff\x1a\x8e\xe2ae\x1e=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae\xc0\xa6d\x12\'y\x11Zcu\xe7\xc4{\\0Y[\xdf\x96\xbf\x97\xa7CS\xfe$\xeb\xac\x9a\xa9\x7f\x85G\xa2\xc8mt\x8fs-\xae\xc6\xd4\x8a|I\xe3\xfe\x04%\x1b\xd8F\xa9\x9f\x96?L\xb7MGE\xbf\x1b\xf8\t\f_\xa0j\x9e\xadM\xa4\xc8\xba\xdc\xabzO8\xeb#\xdc\x1e\v_\v\xc0\xbc\\r`\x8b\x11z\xbb\x89$\xe9t\x8c+6l\f\xd0\x0e\xd0K\x16C\xc8ty\x97\x8ev\x15\xe6\x8a\xc4p\xeb\xe5!\xcfS\x95\xe6\xfa\xb4+C\xc3\x01I\x1f\xea\xc27\xff\x9c\x13\xeed\xed8\xbfR\x01&\xe0@Y\xc9\xe6GL\xd5?\x03', 0x0) ftruncate(r1, 0x2000000) sendfile(r0, r1, 0x0, 0x7fff) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000280)=""/188, 0xbc}], 0x1, 0x1, 0x0) [ 135.575721] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 135.576624] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 135.577098] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 135.577568] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 135.578842] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.579424] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.580207] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.580768] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.581316] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.582942] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.583566] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.584136] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 12:49:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(r3, &(0x7f0000000080)="01", 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) [ 135.668385] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 135.669035] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 135.669503] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 135.669959] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 135.671323] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.672221] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.676189] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.676847] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.677759] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.678377] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.678996] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.679575] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 12:49:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(r3, &(0x7f0000000080)="01", 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) [ 135.714399] syz-executor.5: attempt to access beyond end of device [ 135.714399] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 12:49:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(r3, &(0x7f0000000080)="01", 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) 12:49:44 executing program 6: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae', 0x0) r1 = memfd_create(&(0x7f0000002800)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1,\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\x06\x00\xff\x1a\x8e\xe2ae\x1e=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae\xc0\xa6d\x12\'y\x11Zcu\xe7\xc4{\\0Y[\xdf\x96\xbf\x97\xa7CS\xfe$\xeb\xac\x9a\xa9\x7f\x85G\xa2\xc8mt\x8fs-\xae\xc6\xd4\x8a|I\xe3\xfe\x04%\x1b\xd8F\xa9\x9f\x96?L\xb7MGE\xbf\x1b\xf8\t\f_\xa0j\x9e\xadM\xa4\xc8\xba\xdc\xabzO8\xeb#\xdc\x1e\v_\v\xc0\xbc\\r`\x8b\x11z\xbb\x89$\xe9t\x8c+6l\f\xd0\x0e\xd0K\x16C\xc8ty\x97\x8ev\x15\xe6\x8a\xc4p\xeb\xe5!\xcfS\x95\xe6\xfa\xb4+C\xc3\x01I\x1f\xea\xc27\xff\x9c\x13\xeed\xed8\xbfR\x01&\xe0@Y\xc9\xe6GL\xd5?\x03', 0x0) ftruncate(r1, 0x2000000) sendfile(r0, r1, 0x0, 0x7fff) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000280)=""/188, 0xbc}], 0x1, 0x1, 0x0) [ 135.782618] loop5: detected capacity change from 0 to 40 12:49:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d97aa1", 0xe}, {&(0x7f0000000100)="9f", 0x1}, {&(0x7f00000002c0)='^', 0x1}], 0x3, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000001c0)) sendfile(r3, r0, 0x0, 0xfffffdef) 12:49:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000017ffde00", @ANYBLOB='B\x00\x00\x00\x00\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xf523}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x0, 0x2) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x1, 0x1f, 0xec, 0x1, 0x0, 0x4, 0xa0053, 0x11, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x401, 0x1}, 0x2000, 0x0, 0xffffff84, 0x0, 0xed2, 0x101, 0x1, 0x0, 0x0, 0x0, 0x6287}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000340)) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000240)={0x1, 0x0, 0xa}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fallocate(r2, 0xb, 0x0, 0x101) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 12:49:45 executing program 6: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae', 0x0) r1 = memfd_create(&(0x7f0000002800)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1,\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\x06\x00\xff\x1a\x8e\xe2ae\x1e=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae\xc0\xa6d\x12\'y\x11Zcu\xe7\xc4{\\0Y[\xdf\x96\xbf\x97\xa7CS\xfe$\xeb\xac\x9a\xa9\x7f\x85G\xa2\xc8mt\x8fs-\xae\xc6\xd4\x8a|I\xe3\xfe\x04%\x1b\xd8F\xa9\x9f\x96?L\xb7MGE\xbf\x1b\xf8\t\f_\xa0j\x9e\xadM\xa4\xc8\xba\xdc\xabzO8\xeb#\xdc\x1e\v_\v\xc0\xbc\\r`\x8b\x11z\xbb\x89$\xe9t\x8c+6l\f\xd0\x0e\xd0K\x16C\xc8ty\x97\x8ev\x15\xe6\x8a\xc4p\xeb\xe5!\xcfS\x95\xe6\xfa\xb4+C\xc3\x01I\x1f\xea\xc27\xff\x9c\x13\xeed\xed8\xbfR\x01&\xe0@Y\xc9\xe6GL\xd5?\x03', 0x0) ftruncate(r1, 0x2000000) sendfile(r0, r1, 0x0, 0x7fff) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000280)=""/188, 0xbc}], 0x1, 0x1, 0x0) 12:49:45 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) [ 135.824280] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 135.825175] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 135.825698] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 135.826226] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 135.827585] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.828215] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.828786] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.829399] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.829981] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.830603] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.831218] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.832008] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 135.841499] syz-executor.5: attempt to access beyond end of device [ 135.841499] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 12:49:45 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(r3, &(0x7f0000000080)="01", 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) 12:49:45 executing program 6: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae', 0x0) r1 = memfd_create(&(0x7f0000002800)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1,\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\x01\x00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\x06\x00\xff\x1a\x8e\xe2ae\x1e=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae\xc0\xa6d\x12\'y\x11Zcu\xe7\xc4{\\0Y[\xdf\x96\xbf\x97\xa7CS\xfe$\xeb\xac\x9a\xa9\x7f\x85G\xa2\xc8mt\x8fs-\xae\xc6\xd4\x8a|I\xe3\xfe\x04%\x1b\xd8F\xa9\x9f\x96?L\xb7MGE\xbf\x1b\xf8\t\f_\xa0j\x9e\xadM\xa4\xc8\xba\xdc\xabzO8\xeb#\xdc\x1e\v_\v\xc0\xbc\\r`\x8b\x11z\xbb\x89$\xe9t\x8c+6l\f\xd0\x0e\xd0K\x16C\xc8ty\x97\x8ev\x15\xe6\x8a\xc4p\xeb\xe5!\xcfS\x95\xe6\xfa\xb4+C\xc3\x01I\x1f\xea\xc27\xff\x9c\x13\xeed\xed8\xbfR\x01&\xe0@Y\xc9\xe6GL\xd5?\x03', 0x0) ftruncate(r1, 0x2000000) sendfile(r0, r1, 0x0, 0x7fff) preadv(r0, &(0x7f00000024c0)=[{&(0x7f0000000280)=""/188, 0xbc}], 0x1, 0x1, 0x0) 12:49:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}]}, 0x2c}}, 0x0) 12:49:45 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000100)=ANY=[@ANYBLOB="00e8df0c42a14b634c71080ab0f58df3a7ac482d1e25342dfa6edc3d15b98676bea9c602000000e312bffefb9ac34eb1fe30af161fedc1ef88def2a438d1c1"]) 12:49:45 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) mq_notify(r0, 0x0) 12:49:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r1 = getpgrp(0x0) setpriority(0x1, r1, 0x0) perf_event_open(&(0x7f0000001240)={0x3, 0x80, 0xbf, 0x0, 0x3, 0x5, 0x0, 0x6, 0x8000a, 0xb, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8c68, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x3f, 0x2, 0x0, 0x800000, 0x3, 0x0, 0x5, 0x0, 0x1}, r1, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xc0021, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0x18e8, 0x40, 0x0, 0x0, 0x0, 0x0, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r4, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) [ 136.501180] blktrace: Concurrent blktraces are not allowed on sg0 [ 136.552301] blktrace: Concurrent blktraces are not allowed on sg0 12:49:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000003fc0)={0x20, 0x11, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x2}, @typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x20}], 0x1}, 0x0) 12:49:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}]}, 0x2c}}, 0x0) 12:49:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r1 = getpgrp(0x0) setpriority(0x1, r1, 0x0) perf_event_open(&(0x7f0000001240)={0x3, 0x80, 0xbf, 0x0, 0x3, 0x5, 0x0, 0x6, 0x8000a, 0xb, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8c68, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x3f, 0x2, 0x0, 0x800000, 0x3, 0x0, 0x5, 0x0, 0x1}, r1, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xc0021, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0x18e8, 0x40, 0x0, 0x0, 0x0, 0x0, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r4, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) 12:49:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_io_uring_complete(0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r2 = socket(0x11, 0x2, 0x0) bind$packet(r2, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1710087e", @ANYRES16, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="09b96aaca58b8e8d344b0fecf974b24329f2db179e0b346e2cbd147dcf14b6f68f84b4d2698b57f46ce6ef3c84ad2bfdfb8d06bedafa14f4558f7dbae213a312c338082e53795f067ae0677eb51bb4a3462f644ca7845a69be46184ded4b2d20000453e89e3f7c92e7b32c7b626578f7f8420c6a984a11007489dd632cabe32ae01f310bdda9"], 0x48}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000200)={'syztnl1\x00', 0x0, 0x29, 0x1, 0x5, 0x40, 0x10, @empty, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x80, 0x100, 0x1000}}) sendmsg$ETHTOOL_MSG_RINGS_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000440), 0xc, &(0x7f0000000380)={&(0x7f0000000980)=ANY=[@ANYBLOB="300300c400f86a7500", @ANYRESOCT=r4, @ANYBLOB="081c00018008000300030000ff1800010040c83191b24e8acbb34250e00fe0c8725301e40e275a1aeb0277af1d2740e227a6ea0c2e6c0dd9057582689a9775ca82281e19624f5fb85de58bcdb4d825f8d56a0e6682a845014559ff5692aac45f2a6730b86b7a376216d3fc0e4b23c877034599b0d08553ad6893ee0717f2085e499a02eff18598f2da62cefdd514571ca290c1c9aa547c05e4c9b2f5efe47bbf5979b0054d5ed06325f1b7ef2cf1253b7f0584ac04c5dd9b661ceb691dab2934b67750b78677f8b16690d74f40b97216ddd97090590d387a2930e42323960a33f7311eea59", @ANYRES32=r4, @ANYBLOB="0800030000000000a280b8d03ae0978005110de27ca9bf8f10fc0d9ca4426ed685ae5d4deee7161d738d54115b8fae45aef9a275803128630ff62a43253bdc778660c46d05e6c65693384712e65785f2c17b0d990b8675e119e501f1162093627e2b553d0e1d9d26dbfb66cb1d7c033811522874663304ebc14a564ad6fff493484f63688ff2f649983021d96e85629c54758fd9ed7fffdbc0c31fd371502939012d8d6e1dad1fd0f4d53ab7b8ef7da1e868732d3ff99e39fb08f61c9997e0b328704831"], 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x240000c4) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000100)={0x6, 0x3, 0x7}, &(0x7f0000000340)) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000180)={0x8, 0x7, 0x8}) 12:49:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xb, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="1b7a1666851945cd80a5a2ac0000000000000000b2122fbfdce63a77a865f0778bd425e749feed51f1439746599f0422a9d32dcef6b20d00ce737d913518a188cb9ad737a3f10ee2333baed5899c00ab0d1cce9ff265d634b3b2996ff3a5a91a9283b3b8cbfac984eccdb937f1d200bf96b5b75d5da9e818e348b4", 0x7b, 0x8, 0x0, 0x2}]) r2 = eventfd2(0x7, 0x0) sendfile(r1, r2, &(0x7f0000000340)=0x5, 0x400) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) openat(r1, &(0x7f0000000480)='./file2\x00', 0x101042, 0x19b) write(r3, &(0x7f0000000080)="01", 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x82040, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000300)={0x7, 0x5}) 12:49:45 executing program 7: clone3(&(0x7f0000000300)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, 0x0) 12:49:45 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000100)=ANY=[@ANYBLOB="00e8df0c42a14b634c71080ab0f58df3a7ac482d1e25342dfa6edc3d15b98676bea9c602000000e312bffefb9ac34eb1fe30af161fedc1ef88def2a438d1c1"]) [ 136.722710] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 136.723475] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 136.724023] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 136.724527] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 136.725901] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 136.729088] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 136.729747] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 136.730408] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 136.731006] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 136.731641] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 136.732840] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 136.733426] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 136.923515] blktrace: Concurrent blktraces are not allowed on sg0 12:49:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_io_uring_complete(0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r2 = socket(0x11, 0x2, 0x0) bind$packet(r2, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1710087e", @ANYRES16, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="09b96aaca58b8e8d344b0fecf974b24329f2db179e0b346e2cbd147dcf14b6f68f84b4d2698b57f46ce6ef3c84ad2bfdfb8d06bedafa14f4558f7dbae213a312c338082e53795f067ae0677eb51bb4a3462f644ca7845a69be46184ded4b2d20000453e89e3f7c92e7b32c7b626578f7f8420c6a984a11007489dd632cabe32ae01f310bdda9"], 0x48}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000200)={'syztnl1\x00', 0x0, 0x29, 0x1, 0x5, 0x40, 0x10, @empty, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x80, 0x100, 0x1000}}) sendmsg$ETHTOOL_MSG_RINGS_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000440), 0xc, &(0x7f0000000380)={&(0x7f0000000980)=ANY=[@ANYBLOB="300300c400f86a7500", @ANYRESOCT=r4, @ANYBLOB="081c00018008000300030000ff1800010040c83191b24e8acbb34250e00fe0c8725301e40e275a1aeb0277af1d2740e227a6ea0c2e6c0dd9057582689a9775ca82281e19624f5fb85de58bcdb4d825f8d56a0e6682a845014559ff5692aac45f2a6730b86b7a376216d3fc0e4b23c877034599b0d08553ad6893ee0717f2085e499a02eff18598f2da62cefdd514571ca290c1c9aa547c05e4c9b2f5efe47bbf5979b0054d5ed06325f1b7ef2cf1253b7f0584ac04c5dd9b661ceb691dab2934b67750b78677f8b16690d74f40b97216ddd97090590d387a2930e42323960a33f7311eea59", @ANYRES32=r4, @ANYBLOB="0800030000000000a280b8d03ae0978005110de27ca9bf8f10fc0d9ca4426ed685ae5d4deee7161d738d54115b8fae45aef9a275803128630ff62a43253bdc778660c46d05e6c65693384712e65785f2c17b0d990b8675e119e501f1162093627e2b553d0e1d9d26dbfb66cb1d7c033811522874663304ebc14a564ad6fff493484f63688ff2f649983021d96e85629c54758fd9ed7fffdbc0c31fd371502939012d8d6e1dad1fd0f4d53ab7b8ef7da1e868732d3ff99e39fb08f61c9997e0b328704831"], 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x240000c4) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000100)={0x6, 0x3, 0x7}, &(0x7f0000000340)) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000180)={0x8, 0x7, 0x8}) 12:49:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r1 = getpgrp(0x0) setpriority(0x1, r1, 0x0) perf_event_open(&(0x7f0000001240)={0x3, 0x80, 0xbf, 0x0, 0x3, 0x5, 0x0, 0x6, 0x8000a, 0xb, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8c68, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x3f, 0x2, 0x0, 0x800000, 0x3, 0x0, 0x5, 0x0, 0x1}, r1, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xc0021, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0x18e8, 0x40, 0x0, 0x0, 0x0, 0x0, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r4, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2}) 12:49:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}]}, 0x2c}}, 0x0) 12:49:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_io_uring_complete(0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a3ffaadec89146928b7395f20536bfc376d6debfabdf501ee", 0x3f}], 0x1) r2 = socket(0x11, 0x2, 0x0) bind$packet(r2, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1710087e", @ANYRES16, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="09b96aaca58b8e8d344b0fecf974b24329f2db179e0b346e2cbd147dcf14b6f68f84b4d2698b57f46ce6ef3c84ad2bfdfb8d06bedafa14f4558f7dbae213a312c338082e53795f067ae0677eb51bb4a3462f644ca7845a69be46184ded4b2d20000453e89e VM DIAGNOSIS: 12:49:41 Registers: info registers vcpu 0 RAX=000000000000002d RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b3251 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff88806ce09810 R8 =0000000000000001 R9 =000000000000000a R10=000000000000002d R11=0000000000000001 R12=000000000000002d R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b3240 RIP=ffffffff822b32a9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fcfcac61ef8 CR3=0000000039978000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=000000000002364d RBX=1ffff110083d2f84 RCX=ffffc90003be9000 RDX=0000000000040000 RSI=ffffffff813bc113 RDI=0000000000000005 RBP=ffff888041e97cc8 RSP=ffff888041e97c00 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000001 R13=0000000000000000 R14=0000000000000000 R15=0000000000000200 RIP=ffffffff813bc115 RFL=00000212 [----A--] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fd407ef0700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fd40aa8e018 CR3=000000000df78000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000