cc622fe6af97d2e21d8de252c15d3bf5df76ec81e08aa2b9599ab2eb4b619189831f379e06b48484f2ae77b9f028d39b42bf79a0065be7b80186d5b1daf2d9ae1726b6fd7d455eb6bf9f8526c6c10a9af9ae309c610495661116eff855db9a5cecb6e30fe9e5a7e5995bfdb436a8a8dc3f5c7eb3633ff717cd25b516040afe0f2d02f76e1014a64b5b151f6ea84a2a0cc0ec18ac9383053330bce44d8459961e0dc8e2502dbeca485f1a4f1a39600dd591d702fa8fb240bc928acf7ed9dfdea8a97585057be7ba35a2f60162b65be2fd38785540fb0d3762c58994958e7ed56211899bf82b0ce7c9e66bfb1d27bf7965bfd3d390685eabf6f0a7acc46216d30bdcc83821066ee3ea9afd850a524bbcde82b003f164eeac0c923cc02f7a3feb422f7f5ff9b9fdaf4232d9e272aa362257bd52c0f7e6c6bc7d0678b56c9b4eb542dac4d015ac1dea9f88a4d83c0d1fe2247ee675879e713a72a24cacefa8c3427e1bd680232f67e29633f804969a2a70194438961a538675a5762586e58d68124f9cf2d3c2165308a4075dddb6023924d68e1937f6a79f9342cb9ee4cf635ec6384d111e6ea78bc761affa5b2777ed278163e48d82128b26d61956859008862b3b9751dec1ad2d2c694f3ef95c2fc40c19541ddbdfffa94870b59e3c216b431002c7eaf9fe453a7ae5e9f30c7daaa6c5192057ade8add235c36f80f414703d0d84945e2c1f0b5c827bb9f66b0ffd63a6cb3e9c582488bf37785140efeb76e6fe53fdca3eb9d776b348430c4bb223b90ec9fb14089c2e1782407ddc6370349ec2ae8c38204851fb79ad94b7af321dbdfabd133a2b5761d0f5a95264cca66a9560be96aecd252f61634800849f6e3ce4b911f4f85870bdd2213c20e6e35ff83bb403288bc6acced81b6853fddf871e510364ff16a2ea2dfe0b1a2add1fa8b8dbd73bfd3516b54bf64642d240c5ab907de9bfe68dad7f733cf1d8888fe2a0f3124a044856e47767ca70c022171acc48a1526a88061542019434e99ef454fd571dc3292c4b8bfbf495e49395c4fce47b955fe0fed0878d814a6dbb92ce3090c740c4c2e212a7dba7782a94edae9b3d847e129f6ba748abc15c0914f6796544dfdc0c4040c391c41c42e4ea6e52a3a64769d426dc530b29c70ee978d1d791ca21092b1043970c339905d168ac68f99b3fadf472825fc888970df27a55318c0148e0b9c7854b6b21b655bb90a6d77f2ee21773f36eaa902203cb6df584c0b409ae1826e88144f2126e5d14541603698d862a836165f973ad738b5521e1095a7ac5c3a3de29df2c4ef8088d93cf03191cc8ab00561272cca5367678f88f8f307e7ee2fbf59676b0dce755c325d08d168cdb732b9e3cee6137fded6fe6e5a8fca8245af0ff6d5bc82b951a483c376cba57368bf441425442338b87e8b0327a94603341cd9d020d4f3f1948bc0db5fdf5b88dfed228a76f94ca56ce4e43fb634e93b3afb9a9f13a78f5c8edc54853ffc59518ebf5606e2c93817d54b3aa789a841ee9677c9c11c651405441e4c36bde554c60f6224b67f17fba15ded930e9a08d79d84d3298d0ae6ed3e52989ac60c0417974ffbbe853ed6ff3d0fdce0ce196c2f605e07b71bd9d6477a8c713b101c082e7b2ace221fc99e11029f0ad823079839e1c48c90fa99631d5a8ed38f9d9903b7828b080b71845369e2ffda1d0088bb973b229599704df97ec0699ce798d2efd6d532804e0fdeee77eaf0891f41cb3dd1eb88f865419f38b30101945b3d4c5201b0937bfe0060035e629a0247319471563331db7e18659099e29d1dabb00f81634ee1d01b42aaf8cb27c0b21348d98aef8cac7f31a8f8be70c84d79e705b062f9745161a31a0068c8a9a0dd7543cb8fd2cb2ec1511abfa18982761e8497f757f0fa439486b6ca953d29ac1fd8791ac7f1c9d35b9045e1fcd27223063b6ef84de01f7eadcae30195a302fee3e7025d6052155713ffcabf5b18c36c5d82c5f953d0a6fea1747c4c8c72b76923fe588938ab3e0ddcd25b908cd7a260b6949fb3a04c34c00bb4b5f721ed8d39b678e2b55a17458e28816027376ece3db8e58b787aaab9b261cb8419501abb7749f534a3128ab858a109635e00155dbc36ca807764163393bf0fc4d9da0febb653b26cd3f4ff5eead05e9cf325f3dfeb743e3762263de0e4363ca6452fe4014a2ca6a4a31668517da12982adb8c64083f30f1c1a4158a6be6663ff8e0c3e4e9f4ce841957ae53e23615779d78322194d23a0ec0f70023a8a73d5775fe2da41000122ac413d5a24171d64a78abd86d2b46cfa3858754fd1b6f6e5063f2da23e570845f2a3e1891b1a184cde8b90f232df536927ffb6b2e0d4ad1ae194f872ed0ea6040c6e3a41671dc86290e16092b7d6b65abc3ddeffbaa0329252738b2d3490f4c52fa88b3dd008ea99bf9ce4603f25d47c84e7cdf167404cadc03726757eaa1e87fef8a8db08c06a7da55a60cba62cb259113dd18db5867ac1d2017003b567955ad219b145dac024baa828f7349ebe45f04c6f8a768b67f642e3ef5c07f3ba0974c7f2fa6260757ea68a9fc3f04d9d32c478937aec9bd1cbb0087124a2b7caa335db5aeb2ce19f23a80238420d3fe2fa893494972b78ba2262b77d35e5bc1c9454355d66a43315098b3b08f9c5785facb1312da48b3cf4325f0fa056e54784c8b5d4c24701fc50e79edec4aff6f0b83e0ef5549c56db7cbd324d46533a920f549734b6d182e0a125c8da831e7be80c933dfb645e3585fba47f2d261e8a3ed6ae2f74832fa7d2163078734e45fe513acc62bd7d88aabb7ed2cd9b5540e75e230dd6dae539e2497b40176d1b4fe9e1db2de48051c94edaa934e6c931cd1835ca2a0be34ae80f9b9159d6515ed913636bfc340e7366e606e675dab1c916846e543728a6a687d005b3e857691a5e2b45ac9f94ed429cb315c14102c0dbba7f67979366678a1d32443cdb2e0f0886825fed9524ad3f701fc0a1aee882dd482dc49395675d2994f5154918be55dd7015d1305bccb75c9b46886a52afd16aecfa10a50551554896f609dd1db40dc76697683b94e5cf161beec063b3e72deb03fd953ca080a3703ada793cd33609d0686d87b6b040a6a4b90b0c53779d28bc5e5f7bea2e3f7e39bf824ca3604b0aebadf13faad1e788e9d3015ec9fc37b7a0f184565980be069f06a4c4d4cbb0582c4772c6b28c35d5919719b7f79522ac658e3cf887e03a52ba93306ca20bc5c72ac484eeeb25e649c249a3b0ce23ac4add8c0da457302bdd99b136eff07f3577962a55aa42d1bb0f7398ee115261a88e8f90dcd664339d8c951da4737f3fe65d21a760ab1af0a4a43918d2b9befdad30800b3be9f447673d5f854adfe55b56107912e6ec0a83e1d6e89f205c0c8bfbadb2e564cfdaa523bfb1befbbc0711dd4f955a3998426a7de4cf3531c8d48e", 0x1000}, {&(0x7f0000002880)="6a1e610c71703fba43fc8de40bb6206ff842df90c6d5153a9bb2949b9e8bb33fb6258a1c0be59e0c49ed2115dfb2a52182d6", 0x32}, {&(0x7f00000028c0)="606d23c5fb777f0370eb60d0f576075fa6a9cfebcf514667dafc6696e13c95677513a2f5e220820618f7ab66da811b49c0eba71378bbddc06fa5cae077488cc5dc9eb1ef182b102139ece6b4025b9d1b996a79691cb9e14697fa90dcdd4870baeda866436db5c2be1a8ab77d8879b818aba14956e1695269cfc4de7971b80449b3ee55e3f74ea86508182a3adc2bd625d4ef8c48b46413954f0c0993", 0x9c}, {&(0x7f0000002980)="2955dba3458b3055bf0d2026fe803b24332a875eb9a4d44563f4160bdd2a106e6e92655b64d3bdfe09d1b80a14c2d12ba9d1070202796ea3039d2facb4c90bf6301fafafd9049d3ccc8d93689cbdd575f723feaa30b1fbad5af46924558756e5e8c2423a53d25774c5b01d911c927cc479f1a80319ced99533113852f739300aec2fbcc5beac32052e94c5ff632c1edd150be64d7d6f1ff4b910e95f19ed91325bef65a5b31fcb337ae92c042a5c6177cc44155d333cbc8c5c2b2499d7f3ad2d84a4833d7ac8e5b519fe38ec143237c82fc08daf0a084180731646d229443a06edee3c3863", 0xe5}, {&(0x7f0000002a80)="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", 0xff}, {&(0x7f0000002b80)="c2acadab5f84c6d8954fb01eeb996e19e015c963febe74dd4c5e9ab160bb935a13e7de0bc5e3ea27e70055e9dac91fba6f09765fa781c5b96c32f98ff73aca15ed21d3f660dbb8818cf501b61d6005b2d0fe18a0b8d8f7fa510b7a4f80b805fc912d3c96960195bfda53", 0x6a}, {&(0x7f0000002c00)="cdbb5d3db1aa9083e7a93911c4c02a0ea806b30305268badfa84de2cc5429ed1227bbf1384799993d08e6e03d8d4f30ee33a0a1e5a3a9cdf7eb84961c357a385a705ea06f86c7c4f76c12adbc3035e885dcc50b7a07c18b8b308b0d57634fbbf65b2e991a527da89f35f5a344f81e949fa5b02b1264157adfeef803d81aa323fefd1349a832dbf58e83c8ff3321b3fd13ce15515c9fbec2fddab2590e0f2b11f445982c9dc9a3eddbb742c7d486f7c5266829b1d0b712bdacb038a3a809a573ebde7b7f3ebdb8b3849886d6562c83b", 0xcf}, {&(0x7f0000002d00)="57a7843cae28d7425268763b3b0f6a5111e717660efc4dc9f5b9ef03dab591763904eb701238f774657cd85b14a9efe538d9415604e653702cf80a4d57c18fade8f654e8716794ee98c6ebf93cda99dfaafd80aee9988d3e22fe789039d4bf14ff66fb3908dd9fccb6f104b127f0f34a2e6a891a165eb0cbc369377f8f0fd6db2325ef962acfaee4405fd57cec581a3ad3f6062a43710f82144e9f03f281686c58371aca89d6929bd35b6b5f5b529b0fa17b7ddb163dee5db05e73634e9afb4914d70bdd7361d314", 0xc8}, {&(0x7f0000002e00)="7eab7e8e8be514580cb8d0e108f1a790f3fd6f9fb1aa224e7fa4daf5b570db0f1da42738868d4af8f4f629b1056a66942b56173b0573ac8139d6980b77fcdd722ed7882e092d2675d6044d6719a5d5faa1c683a8d414bd95c2c592c3265f456a0eef7324aa574fcd4e6fd0add4c1c31789bcd03c49f91fb74c1be8d17a582c4df32821e04a1df16cb490f32d4d5acac07bf177a5aeccccd0760fc4510eca17ff2fad9ada72e5fd7f9bf1e0d49a1ec26c5331dff6", 0xb4}], 0xa, &(0x7f0000002f80)=[@hopopts={{0x20, 0x29, 0x36, {0x3a, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x1f}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x400}}, @dstopts={{0x90, 0x29, 0x37, {0x33, 0xf, '\x00', [@hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @mcast2}, @jumbo={0xc2, 0x4, 0x611}, @jumbo={0xc2, 0x4, 0x6}, @padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xb220}, @generic={0x0, 0x2c, "e923fdf0e8931306084ade42869070c56bd991dd67db8bb3622189424f492908973a50eabf5df9669e823a38"}, @jumbo={0xc2, 0x4, 0x3}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x401}}, @rthdr={{0x38, 0x29, 0x39, {0x32, 0x4, 0x2, 0x0, 0x0, [@rand_addr=' \x01\x00', @private0={0xfc, 0x0, '\x00', 0x1}]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x11, 0x2, '\x00', [@hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x1a}}, @enc_lim]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xfffffffb}}, @dstopts={{0x20, 0x29, 0x37, {0x0, 0x0, '\x00', [@pad1, @enc_lim={0x4, 0x1, 0x1}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @rthdr_2292={{0x78, 0x29, 0x39, {0x3a, 0xc, 0x0, 0x1, 0x0, [@local, @private0, @remote, @loopback, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}}}], 0x210}}, {{&(0x7f00000031c0)={0xa, 0x4e20, 0x9, @private0={0xfc, 0x0, '\x00', 0x1}, 0x400}, 0x1c, &(0x7f0000006540)=[{&(0x7f0000003200)="2067b0649532df0ab2296ebd41e7ad0010aee1fe5cda237408cbbe87062a657c18ec276acb139529fc8f7b16b891fd271bf2a35d564f618aba10b815cc796b60b8a2f6f34525bfd1c30b3fa36f57dbcd635dc565806b21431dd449b1d4e2d4edeedf7d6bcd0d1bcf7ac05d1ad3ff9a320eab551fb94b01ae24b5b68fa18d9053c990b64f5e61658efd", 0x89}, {&(0x7f00000032c0)="4ca265d3fa2a1faca3308e9f50997802d932e7eaea333a79c51b60bb874ced70fcae963776cbb4c4580e98db820ac157b722db403e9ea36cb485037f2ba0be1ed0dc90dd6c1b52e9cb11c026165e677832684481da55b173cc7f3230dd742ba6f8713583ed8c33c80a4d09e96963441fdd6281bd15fe2d80da51396abd4d816acd94d87ee14cb5a48cb6122927a496234e3514fb5bdb6e5defd47fd241d49c3496ca7b74472fec561865ed070ffa0f160899669745dd5ef78f3545526616b8d8c5e56dda06d0e06743a3f0f2eb98dbbfbd82d0c3", 0xd4}, {&(0x7f00000033c0)="c5f015caef81f6f1db8913d8c29cc870bc40e20a444f587111772d649bd1badab48df8d8a7dc1f6bd04a3682c9123d45cc3754014bde0a8c320136c563c4e3be33b3ac7a6de1d62ae8c8450b78c8520fc62c273ce9fed796167894e9e6223628ad2bf791d314369611f9ac3a0c832aaf6bd7fa6d731e2279ffb090b12b", 0x7d}, {&(0x7f0000003440)="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", 0x1000}, {&(0x7f0000004440)="ca949ad43b9011f4b50f40fb89d66796b60abbf5120b5a2bdeeb46b40d392acac2ede6aaaa545753", 0x28}, {&(0x7f0000004480)="d94f8eecb81824d8bebb0a3b8a225ff90f531eefc8a67d616dd2f53e918b2ad071a9f1fe0c4119d3564e94dfe9703308c62a3f3914a34fabcb826effcd1e8e7390", 0x41}, {&(0x7f0000004500)="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", 0x1000}, {&(0x7f0000005500)="db94f76bcad52e40800a", 0xa}, {&(0x7f0000005540)="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", 0x1000}], 0x9, &(0x7f0000006600)=[@rthdrdstopts={{0x168, 0x29, 0x37, {0x2, 0x29, '\x00', [@pad1, @ra={0x5, 0x2, 0x4288}, @jumbo={0xc2, 0x4, 0x8}, @calipso={0x7, 0x28, {0x0, 0x8, 0x14, 0x5, [0x6, 0x4, 0x6, 0x6]}}, @generic={0x3, 0xfc, "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"}, @hao={0xc9, 0x10, @mcast2}, @ra={0x5, 0x2, 0xae}]}}}, @tclass={{0x14, 0x29, 0x43, 0x284c}}], 0x180}}], 0x6, 0xc044) sendmmsg$inet6(r0, &(0x7f0000000000), 0x0, 0x8040) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000140)={@ipv4={'\x00', '\xff\xff', @empty}, 0x40, 0x2, 0x3, 0x9, 0x9f07, 0x1}, 0x20) getdents(r4, &(0x7f00000001c0)=""/219, 0xdb) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x2f, @mcast2, 0x6}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e24, 0x73d3, @dev={0xfe, 0x80, '\x00', 0x18}, 0xade}, 0x1c) 10:24:27 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000240)='./file0\x00', 0x1, 0xa, &(0x7f0000000940)=[{&(0x7f0000000280)="47c4e9918f9f177542957d08445d2bc034d9d6be2938756761cb351c159d2a3c7e94ec1e882b4913a10be1de667db4975b82be338bfedaff7b67a6ab82646d3b34b5fd7871fb50069ccf672de1642508296d975a0e6869ba416f7d4f62101a5cb934e1743fba5a8607d7", 0x6a, 0x8}, {&(0x7f0000000440)="a03dc0fe54a47a0834a23290b65a33897d8dc27f5d8c2244ca6e1d0282ce25c486a91518f9dc9eedc2352e3d22b1c4a32e47c4f28e87e14f9911ad475ba860e4e59e069ecfeaf5d83c278c7428f39144bf15a7eca0015b393eb9ac07000500e875883a89aa9b4b91cbf7ff137e670023f59443d6d9fcd0", 0x77, 0x1}, {&(0x7f0000000300), 0x0, 0x7}, {&(0x7f00000004c0)="329d41435bf434852c40154d3ad6e2dae91d20ee98d3fb1349d5d36462088f41c913a70a8b7fd1f86a7d7c42de9391867e2ed2c940541eb49bed053e1e6d70818ab3ab94566af5d99bd53ca5200d29cec81c164ff861f6c27a0d8704e6701a6ea5e2bd015412523a946e375a98e690c254799269deacd821284172e958b77f3667b13064925d9eed2a71ffc042576386bac6a28a3b79508a9edcb6179d20f21612c7e5a7ea5c94de2eb3fa530a", 0xad, 0x9}, {&(0x7f0000000580)="2a80d9b3c4ad5580779f69d16ebc837cb4171120897943dda5dc", 0x1a, 0x6d3}, {&(0x7f00000005c0)="5c1fec47d1a956512bb68c5109f402a8b722324a5accc3c4464e42bddbec40cd90e1", 0x22, 0x7}, {&(0x7f0000000600)="cebec107cc7eca38aabaf46176cf5b012990e7e31598cb055db50feadc", 0x1d, 0x6}, {&(0x7f0000000640)="711b364e56c382fdf9aab812f4727e448bc62f90465e7137cfb53097ba349eb2c5da18400f31e743d04952472e139664109dbcbd123ab931d84bb378f9241435054ee52dc1d27095760f32e3e7783a0999707efbc8480e19c21f0629b544c786f44a035ea6d65f07e1e2c94a08bc1143f8db528485f3bef4cd553d86352e4936beddbec6d291b38f0e1b431dae964dd4cbc1b9e6572092ae1864f935a6ebd2698c91f40f7ee137f5b759c4577594e0af747b410c0019809ea43167e5e4120e6a67a4cd55e59c7a0a", 0xc8, 0x9}, {&(0x7f0000000840)="6f0c77d0ce7ca9db6073c69f62331078eb180ef2913410fb9a4208dd5f6d67cf6e4f27262a1c9058fb0046b950d965b773573e8b5d491dcbb6d77c0ffe25810b50cf71203637cc4bbc87a44603a4c0697e570a2d2fb43cf2b40da9b100da29a401a63fdbaa3539f382ef7d7cef89716f8b9996cafdd260758f14b335d098e8bce8311898ba0026347825b8d8468bf204bada91dbfb770b27a1aa489d35fc7f851ba5a9e5f163e4f4cc78626d7cf59c137c38d27628c02b14cb1d9b1e5a9d8427aa2c8057cb4dd67824aa7dc125dab0ea60270655281db2b9783edab972c810ca7f42adb93681673aee75eec07588da263d4d61a5b20bc15bd8012b", 0xfb, 0x7}, {&(0x7f0000000740)="f242a90cfc399bfd681aaa59176b5804eaa583c8cfb3d8f0ee2a1cb74e3bf8c5cbd39fe7b5889b0413779ae2e91be6806fb0a06dfa3635be6b2197bc123ca5e6799aaa4a90ee740c28a8c68b778a005278294269812717804beb9545619b55bf249b0fe38a8b6d0a8bc77fbe9b31718070778564299b6a514a7ea58070558423649b27b2e14a519eb79e78223cb02d036766ef7d82232d23ddcbcdb8093690800a21215ae842f756dbdf58699b314af6bde9f5224a27c415caaa9c", 0xbb, 0x1}], 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:24:27 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340), 0x20000, 0x0) [ 290.902271] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.6'. [ 290.928940] loop3: detected capacity change from 0 to 6 [ 290.956857] loop1: detected capacity change from 0 to 1 [ 290.959967] EXT4-fs: Ignoring removed orlov option [ 290.968713] EXT4-fs (loop1): unable to read superblock [ 290.980324] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.6'. 10:24:39 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000000a00)=ANY=[@ANYBLOB="040100002d00010000000000000000000c0000100100000011000000e800000040dfdf6a100b04dbb57afb10d33ba91f12d1ca7ff59dc6dde8656d1b4439ed8829ab944e2df0c6043653b62ceb932c111e8db8a15880a08d394234633a28815ef08225c067054ba92aa5482e95f4e97461ccbaa6d6cca4b7896fee000000000000f5c47807bcec6dd35ecf72ecb44c8ec6f32ebfaf6b9c834c32675c65f3e4a370d74d7941f5094b89b5fa727bad09964fb627ccbcd7baaa0a184d490153781b0900442671697c9e67e9ff9686384dab6133cca5e2826ab52344646544a6a70718b1b4ff982fa5add9d26384f15c8235e8de1483aa7080ccb319f590e8c61d82214c8dab7b17c7f0f7b882c1918d970f7a3abc729e3a98a1ff22b886daadbd6eb7fcad77c80bb2bcd411063124d6c2b1f93c9c391c67bc6ae02df17aa06684791c10fbca9f4a73b2f4b8b98caac79f37972283e5cf79390e2df47a1ee5e098149a9f9f1b293197a03d23ebe6f3e6f9e3b6dc23e7bf06820bbd84b2e3709ecce897e0efb29904d31940bf220d9e57544fb38cbf508133ed5c0df889ccfc8eba25c92aa074c1d9d8f8017ba06d35a768fc41eed4d9b8d087ca2328cf41de39f8967da2c1d10c20c621d174c852e1b488f6b9"], 0x104}], 0x1}, 0x0) 10:24:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:24:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:24:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) pread64(r0, &(0x7f00000012c0)=""/4093, 0xffd, 0x0) 10:24:39 executing program 5: r0 = fork() r1 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4842, 0x0) getpgrp(0x0) openat(r2, &(0x7f0000000040)='./file1\x00', 0x2000, 0x8) r3 = getpid() r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = fork() wait4(r5, &(0x7f0000000240), 0x80000000, 0x0) perf_event_open(0x0, r5, 0x0, 0xffffffffffffffff, 0x2) capget(&(0x7f0000000280)={0x20080522, r5}, &(0x7f00000002c0)={0x2, 0x3, 0x6ab7d47f, 0x80, 0x3, 0x6b97}) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x1, 0x2, 0x8, 0x5, 0x0, 0x3, 0x2000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f00000001c0), 0x3}, 0x42204, 0x800, 0x7ba7, 0x5, 0x0, 0xc360, 0x8, 0x0, 0xffffffff, 0x0, 0x5}, r3, 0x10, r4, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x98080, 0x0) getpid() getpid() perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r7 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r7, 0x3e, &(0x7f0000000140)={0x102f, 0x7}) write(r6, &(0x7f0000000080)="01", 0x292e9) 10:24:39 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), 0x0, 0x1, 0xa, &(0x7f0000000940)=[{&(0x7f0000000280)="47c4e9918f9f177542957d08445d2bc034d9d6be2938756761cb351c159d2a3c7e94ec1e882b4913a10be1de667db4975b82be338bfedaff7b67a6ab82646d3b34b5fd7871fb50069ccf672de1642508296d975a0e6869ba416f7d4f62101a5cb934e1743fba5a8607d7", 0x6a, 0x8}, {&(0x7f0000000440)="a03dc0fe54a47a0834a23290b65a33897d8dc27f5d8c2244ca6e1d0282ce25c486a91518f9dc9eedc2352e3d22b1c4a32e47c4f28e87e14f9911ad475ba860e4e59e069ecfeaf5d83c278c7428f39144bf15a7eca0015b393eb9ac07000500e875883a89aa9b4b91cbf7ff137e670023f59443d6d9fcd0", 0x77, 0x1}, {&(0x7f0000000300), 0x0, 0x7}, {&(0x7f00000004c0)="329d41435bf434852c40154d3ad6e2dae91d20ee98d3fb1349d5d36462088f41c913a70a8b7fd1f86a7d7c42de9391867e2ed2c940541eb49bed053e1e6d70818ab3ab94566af5d99bd53ca5200d29cec81c164ff861f6c27a0d8704e6701a6ea5e2bd015412523a946e375a98e690c254799269deacd821284172e958b77f3667b13064925d9eed2a71ffc042576386bac6a28a3b79508a9edcb6179d20f21612c7e5a7ea5c94de2eb3fa530a", 0xad, 0x9}, {&(0x7f0000000580)="2a80d9b3c4ad5580779f69d16ebc837cb4171120897943dda5dc", 0x1a, 0x6d3}, {&(0x7f00000005c0)="5c1fec47d1a956512bb68c5109f402a8b722324a5accc3c4464e42bddbec40cd90e1", 0x22, 0x7}, {&(0x7f0000000600)="cebec107cc7eca38aabaf46176cf5b012990e7e31598cb055db50feadc", 0x1d, 0x6}, {&(0x7f0000000640)="711b364e56c382fdf9aab812f4727e448bc62f90465e7137cfb53097ba349eb2c5da18400f31e743d04952472e139664109dbcbd123ab931d84bb378f9241435054ee52dc1d27095760f32e3e7783a0999707efbc8480e19c21f0629b544c786f44a035ea6d65f07e1e2c94a08bc1143f8db528485f3bef4cd553d86352e4936beddbec6d291b38f0e1b431dae964dd4cbc1b9e6572092ae1864f935a6ebd2698c91f40f7ee137f5b759c4577594e0af747b410c0019809ea43167e5e4120e6a67a4cd55e59c7a0a", 0xc8, 0x9}, {&(0x7f0000000840)="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", 0xfb, 0x7}, {&(0x7f0000000740)="f242a90cfc399bfd681aaa59176b5804eaa583c8cfb3d8f0ee2a1cb74e3bf8c5cbd39fe7b5889b0413779ae2e91be6806fb0a06dfa3635be6b2197bc123ca5e6799aaa4a90ee740c28a8c68b778a005278294269812717804beb9545619b55bf249b0fe38a8b6d0a8bc77fbe9b31718070778564299b6a514a7ea58070558423649b27b2e14a519eb79e78223cb02d036766ef7d82232d23ddcbcdb8093690800a21215ae842f756dbdf58699b314af6bde9f5224a27c415caaa9c", 0xbb, 0x1}], 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:24:39 executing program 7: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x672602) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = clone3(&(0x7f0000000380)={0x137363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_open(r3, 0x0) perf_event_open(0x0, r3, 0x6, r2, 0x0) r4 = syz_io_uring_complete(0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x4543c, 0x3, 0x4, 0x1, 0x2, 0x3, 0x6, 0x0, 0x9f, 0x0, 0xffffffffffff5769}, r3, 0x4, r4, 0x3) fcntl$notify(r0, 0x402, 0x80000009) 10:24:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) syz_io_uring_setup(0x200101, &(0x7f0000000080)={0x0, 0x100, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000000/0x4000)=nil, 0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(0x0, r2, 0x0, 0x8001) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, r4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r3, 0x80, &(0x7f0000000180)=@nfc={0x27, 0x1, 0x2, 0x3}, 0x0, 0x0, 0x0, {0x0, r4}}, 0x2) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000002, 0x401a012, r5, 0x0) pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x103000, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, r6, &(0x7f0000000040)=0x80, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @my}, 0x0, 0x800, 0x1}, 0x8) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r7 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, r7) pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xd, r7) 10:24:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340), 0x20000, 0x0) [ 302.946866] loop2: detected capacity change from 0 to 512 [ 302.959998] loop3: detected capacity change from 0 to 6 [ 303.024107] loop4: detected capacity change from 0 to 1 [ 303.029772] EXT4-fs: Ignoring removed orlov option [ 303.035110] EXT4-fs (loop4): unable to read superblock 10:24:40 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), 0x0, 0x1, 0xa, &(0x7f0000000940)=[{&(0x7f0000000280)="47c4e9918f9f177542957d08445d2bc034d9d6be2938756761cb351c159d2a3c7e94ec1e882b4913a10be1de667db4975b82be338bfedaff7b67a6ab82646d3b34b5fd7871fb50069ccf672de1642508296d975a0e6869ba416f7d4f62101a5cb934e1743fba5a8607d7", 0x6a, 0x8}, {&(0x7f0000000440)="a03dc0fe54a47a0834a23290b65a33897d8dc27f5d8c2244ca6e1d0282ce25c486a91518f9dc9eedc2352e3d22b1c4a32e47c4f28e87e14f9911ad475ba860e4e59e069ecfeaf5d83c278c7428f39144bf15a7eca0015b393eb9ac07000500e875883a89aa9b4b91cbf7ff137e670023f59443d6d9fcd0", 0x77, 0x1}, {&(0x7f0000000300), 0x0, 0x7}, {&(0x7f00000004c0)="329d41435bf434852c40154d3ad6e2dae91d20ee98d3fb1349d5d36462088f41c913a70a8b7fd1f86a7d7c42de9391867e2ed2c940541eb49bed053e1e6d70818ab3ab94566af5d99bd53ca5200d29cec81c164ff861f6c27a0d8704e6701a6ea5e2bd015412523a946e375a98e690c254799269deacd821284172e958b77f3667b13064925d9eed2a71ffc042576386bac6a28a3b79508a9edcb6179d20f21612c7e5a7ea5c94de2eb3fa530a", 0xad, 0x9}, {&(0x7f0000000580)="2a80d9b3c4ad5580779f69d16ebc837cb4171120897943dda5dc", 0x1a, 0x6d3}, {&(0x7f00000005c0)="5c1fec47d1a956512bb68c5109f402a8b722324a5accc3c4464e42bddbec40cd90e1", 0x22, 0x7}, {&(0x7f0000000600)="cebec107cc7eca38aabaf46176cf5b012990e7e31598cb055db50feadc", 0x1d, 0x6}, {&(0x7f0000000640)="711b364e56c382fdf9aab812f4727e448bc62f90465e7137cfb53097ba349eb2c5da18400f31e743d04952472e139664109dbcbd123ab931d84bb378f9241435054ee52dc1d27095760f32e3e7783a0999707efbc8480e19c21f0629b544c786f44a035ea6d65f07e1e2c94a08bc1143f8db528485f3bef4cd553d86352e4936beddbec6d291b38f0e1b431dae964dd4cbc1b9e6572092ae1864f935a6ebd2698c91f40f7ee137f5b759c4577594e0af747b410c0019809ea43167e5e4120e6a67a4cd55e59c7a0a", 0xc8, 0x9}, {&(0x7f0000000840)="6f0c77d0ce7ca9db6073c69f62331078eb180ef2913410fb9a4208dd5f6d67cf6e4f27262a1c9058fb0046b950d965b773573e8b5d491dcbb6d77c0ffe25810b50cf71203637cc4bbc87a44603a4c0697e570a2d2fb43cf2b40da9b100da29a401a63fdbaa3539f382ef7d7cef89716f8b9996cafdd260758f14b335d098e8bce8311898ba0026347825b8d8468bf204bada91dbfb770b27a1aa489d35fc7f851ba5a9e5f163e4f4cc78626d7cf59c137c38d27628c02b14cb1d9b1e5a9d8427aa2c8057cb4dd67824aa7dc125dab0ea60270655281db2b9783edab972c810ca7f42adb93681673aee75eec07588da263d4d61a5b20bc15bd8012b", 0xfb, 0x7}, {&(0x7f0000000740)="f242a90cfc399bfd681aaa59176b5804eaa583c8cfb3d8f0ee2a1cb74e3bf8c5cbd39fe7b5889b0413779ae2e91be6806fb0a06dfa3635be6b2197bc123ca5e6799aaa4a90ee740c28a8c68b778a005278294269812717804beb9545619b55bf249b0fe38a8b6d0a8bc77fbe9b31718070778564299b6a514a7ea58070558423649b27b2e14a519eb79e78223cb02d036766ef7d82232d23ddcbcdb8093690800a21215ae842f756dbdf58699b314af6bde9f5224a27c415caaa9c", 0xbb, 0x1}], 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:24:40 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) [ 303.102022] loop1: detected capacity change from 0 to 1 [ 303.112105] EXT4-fs: Ignoring removed orlov option [ 303.125568] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.6'. [ 303.127097] EXT4-fs (loop1): unable to read superblock 10:24:40 executing program 0: sendmsg$NL802154_CMD_SET_TX_POWER(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() wait4(r1, &(0x7f0000000240), 0x80000000, 0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x40, 0x1f, 0x38, 0x1, 0x0, 0xa34c, 0x4020, 0x7, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x6, 0xc9}, 0x40000, 0x6, 0x1, 0x1, 0x1dd, 0x9, 0x800, 0x0, 0x6, 0x0, 0xac5}, r1, 0xffffffffffffffff, r0, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000027f) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x40, 0x6, 0x0, 0x3af, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xffffffff}, 0x40430, 0x4, 0x7fffffff, 0x0, 0x6b, 0x1, 0xc69, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x200, 0x70bf22, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}}, 0x20000000) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0xb) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x3, 0x2, 0x5, 0x0, 0x0, {0x2, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40008}, 0x0) 10:24:40 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340), 0x20000, 0x0) [ 303.163016] loop3: detected capacity change from 0 to 6 [ 303.174583] loop2: detected capacity change from 0 to 512 10:24:40 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x60, 0x0, 0xfffffffffffffffe}, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x3, 0x2, 0x2, 0x4, 0x0, 0x20, 0x3001, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff1abe, 0x0, @perf_config_ext={0x9, 0x2}, 0xa000, 0x8, 0x9e05, 0x2, 0xed4, 0x5, 0x1, 0x0, 0x20, 0x0, 0x80000001}, 0xffffffffffffffff, 0x8, r0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x3}, 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x4000000) 10:24:40 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x104}], 0x1}, 0x0) 10:24:40 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) write(r3, &(0x7f0000000200)='E', 0x140000) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r4, &(0x7f00000001c0)=""/219, 0xdb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000240)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r4, 0x50009418, &(0x7f0000000440)={{r1}, r5, 0x12, @unused=[0x6, 0x6, 0x5], @subvolid=0x2}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 10:24:40 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), 0x0, 0x1, 0xa, &(0x7f0000000940)=[{&(0x7f0000000280)="47c4e9918f9f177542957d08445d2bc034d9d6be2938756761cb351c159d2a3c7e94ec1e882b4913a10be1de667db4975b82be338bfedaff7b67a6ab82646d3b34b5fd7871fb50069ccf672de1642508296d975a0e6869ba416f7d4f62101a5cb934e1743fba5a8607d7", 0x6a, 0x8}, {&(0x7f0000000440)="a03dc0fe54a47a0834a23290b65a33897d8dc27f5d8c2244ca6e1d0282ce25c486a91518f9dc9eedc2352e3d22b1c4a32e47c4f28e87e14f9911ad475ba860e4e59e069ecfeaf5d83c278c7428f39144bf15a7eca0015b393eb9ac07000500e875883a89aa9b4b91cbf7ff137e670023f59443d6d9fcd0", 0x77, 0x1}, {&(0x7f0000000300), 0x0, 0x7}, {&(0x7f00000004c0)="329d41435bf434852c40154d3ad6e2dae91d20ee98d3fb1349d5d36462088f41c913a70a8b7fd1f86a7d7c42de9391867e2ed2c940541eb49bed053e1e6d70818ab3ab94566af5d99bd53ca5200d29cec81c164ff861f6c27a0d8704e6701a6ea5e2bd015412523a946e375a98e690c254799269deacd821284172e958b77f3667b13064925d9eed2a71ffc042576386bac6a28a3b79508a9edcb6179d20f21612c7e5a7ea5c94de2eb3fa530a", 0xad, 0x9}, {&(0x7f0000000580)="2a80d9b3c4ad5580779f69d16ebc837cb4171120897943dda5dc", 0x1a, 0x6d3}, {&(0x7f00000005c0)="5c1fec47d1a956512bb68c5109f402a8b722324a5accc3c4464e42bddbec40cd90e1", 0x22, 0x7}, {&(0x7f0000000600)="cebec107cc7eca38aabaf46176cf5b012990e7e31598cb055db50feadc", 0x1d, 0x6}, {&(0x7f0000000640)="711b364e56c382fdf9aab812f4727e448bc62f90465e7137cfb53097ba349eb2c5da18400f31e743d04952472e139664109dbcbd123ab931d84bb378f9241435054ee52dc1d27095760f32e3e7783a0999707efbc8480e19c21f0629b544c786f44a035ea6d65f07e1e2c94a08bc1143f8db528485f3bef4cd553d86352e4936beddbec6d291b38f0e1b431dae964dd4cbc1b9e6572092ae1864f935a6ebd2698c91f40f7ee137f5b759c4577594e0af747b410c0019809ea43167e5e4120e6a67a4cd55e59c7a0a", 0xc8, 0x9}, {&(0x7f0000000840)="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", 0xfb, 0x7}, {&(0x7f0000000740)="f242a90cfc399bfd681aaa59176b5804eaa583c8cfb3d8f0ee2a1cb74e3bf8c5cbd39fe7b5889b0413779ae2e91be6806fb0a06dfa3635be6b2197bc123ca5e6799aaa4a90ee740c28a8c68b778a005278294269812717804beb9545619b55bf249b0fe38a8b6d0a8bc77fbe9b31718070778564299b6a514a7ea58070558423649b27b2e14a519eb79e78223cb02d036766ef7d82232d23ddcbcdb8093690800a21215ae842f756dbdf58699b314af6bde9f5224a27c415caaa9c", 0xbb, 0x1}], 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) [ 303.307241] loop4: detected capacity change from 0 to 1 [ 303.322806] EXT4-fs: Ignoring removed orlov option [ 303.339079] EXT4-fs (loop4): unable to read superblock [ 303.349223] loop3: detected capacity change from 0 to 6 [ 303.374945] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.6'. 10:24:52 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x60, 0x0, 0xfffffffffffffffe}, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x3, 0x2, 0x2, 0x4, 0x0, 0x20, 0x3001, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff1abe, 0x0, @perf_config_ext={0x9, 0x2}, 0xa000, 0x8, 0x9e05, 0x2, 0xed4, 0x5, 0x1, 0x0, 0x20, 0x0, 0x80000001}, 0xffffffffffffffff, 0x8, r0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x3}, 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x4000000) 10:24:52 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) write(r3, &(0x7f0000000200)='E', 0x140000) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r4, &(0x7f00000001c0)=""/219, 0xdb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000240)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r4, 0x50009418, &(0x7f0000000440)={{r1}, r5, 0x12, @unused=[0x6, 0x6, 0x5], @subvolid=0x2}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 10:24:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:24:52 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x104}], 0x1}, 0x0) 10:24:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:24:52 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0xa, &(0x7f0000000940)=[{&(0x7f0000000280)="47c4e9918f9f177542957d08445d2bc034d9d6be2938756761cb351c159d2a3c7e94ec1e882b4913a10be1de667db4975b82be338bfedaff7b67a6ab82646d3b34b5fd7871fb50069ccf672de1642508296d975a0e6869ba416f7d4f62101a5cb934e1743fba5a8607d7", 0x6a, 0x8}, {&(0x7f0000000440)="a03dc0fe54a47a0834a23290b65a33897d8dc27f5d8c2244ca6e1d0282ce25c486a91518f9dc9eedc2352e3d22b1c4a32e47c4f28e87e14f9911ad475ba860e4e59e069ecfeaf5d83c278c7428f39144bf15a7eca0015b393eb9ac07000500e875883a89aa9b4b91cbf7ff137e670023f59443d6d9fcd0", 0x77, 0x1}, {&(0x7f0000000300), 0x0, 0x7}, {&(0x7f00000004c0)="329d41435bf434852c40154d3ad6e2dae91d20ee98d3fb1349d5d36462088f41c913a70a8b7fd1f86a7d7c42de9391867e2ed2c940541eb49bed053e1e6d70818ab3ab94566af5d99bd53ca5200d29cec81c164ff861f6c27a0d8704e6701a6ea5e2bd015412523a946e375a98e690c254799269deacd821284172e958b77f3667b13064925d9eed2a71ffc042576386bac6a28a3b79508a9edcb6179d20f21612c7e5a7ea5c94de2eb3fa530a", 0xad, 0x9}, {&(0x7f0000000580)="2a80d9b3c4ad5580779f69d16ebc837cb4171120897943dda5dc", 0x1a, 0x6d3}, {&(0x7f00000005c0)="5c1fec47d1a956512bb68c5109f402a8b722324a5accc3c4464e42bddbec40cd90e1", 0x22, 0x7}, {&(0x7f0000000600)="cebec107cc7eca38aabaf46176cf5b012990e7e31598cb055db50feadc", 0x1d, 0x6}, {&(0x7f0000000640)="711b364e56c382fdf9aab812f4727e448bc62f90465e7137cfb53097ba349eb2c5da18400f31e743d04952472e139664109dbcbd123ab931d84bb378f9241435054ee52dc1d27095760f32e3e7783a0999707efbc8480e19c21f0629b544c786f44a035ea6d65f07e1e2c94a08bc1143f8db528485f3bef4cd553d86352e4936beddbec6d291b38f0e1b431dae964dd4cbc1b9e6572092ae1864f935a6ebd2698c91f40f7ee137f5b759c4577594e0af747b410c0019809ea43167e5e4120e6a67a4cd55e59c7a0a", 0xc8, 0x9}, {&(0x7f0000000840)="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", 0xfb, 0x7}, {&(0x7f0000000740)="f242a90cfc399bfd681aaa59176b5804eaa583c8cfb3d8f0ee2a1cb74e3bf8c5cbd39fe7b5889b0413779ae2e91be6806fb0a06dfa3635be6b2197bc123ca5e6799aaa4a90ee740c28a8c68b778a005278294269812717804beb9545619b55bf249b0fe38a8b6d0a8bc77fbe9b31718070778564299b6a514a7ea58070558423649b27b2e14a519eb79e78223cb02d036766ef7d82232d23ddcbcdb8093690800a21215ae842f756dbdf58699b314af6bde9f5224a27c415caaa9c", 0xbb, 0x1}], 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:24:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340), 0x20000, 0x0) 10:24:52 executing program 0: sendmsg$NL802154_CMD_SET_TX_POWER(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fork() wait4(r1, &(0x7f0000000240), 0x80000000, 0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x40, 0x1f, 0x38, 0x1, 0x0, 0xa34c, 0x4020, 0x7, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x6, 0xc9}, 0x40000, 0x6, 0x1, 0x1, 0x1dd, 0x9, 0x800, 0x0, 0x6, 0x0, 0xac5}, r1, 0xffffffffffffffff, r0, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x10000027f) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x40, 0x6, 0x0, 0x3af, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xffffffff}, 0x40430, 0x4, 0x7fffffff, 0x0, 0x6b, 0x1, 0xc69, 0x0, 0xfffffffd, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x200, 0x70bf22, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}}, 0x20000000) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0xb) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x3, 0x2, 0x5, 0x0, 0x0, {0x2, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40008}, 0x0) [ 315.170478] loop3: detected capacity change from 0 to 6 10:24:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:24:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:24:52 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:24:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) [ 315.295784] loop7: detected capacity change from 0 to 1 [ 315.302740] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.6'. [ 315.302824] loop4: detected capacity change from 0 to 1 [ 315.303627] EXT4-fs: Ignoring removed orlov option [ 315.306297] EXT4-fs (loop7): unable to read superblock 10:24:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:24:52 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) [ 315.340108] EXT4-fs: Ignoring removed orlov option [ 315.356935] EXT4-fs (loop4): unable to read superblock 10:24:52 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 10:25:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x163008, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="7ab9a3a6487a103a34b46864ab48f73fc9ffb4335c6e6830549c89086d66805599f92e6d655e539d82d48f0103b16a8ee3a669bb0bed6c45be0f5ba1a28b1cb1388d9a6d1ac81ff964df357a7ea2595b33c663d5a1ac90d9e13a53b1cf2863e09709", 0x62, 0x6}], 0x3000000, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x3}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_eq}, {@audit}, {@fsmagic}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) r0 = syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x10040aa, &(0x7f0000000380)=ANY=[@ANYBLOB="7374726970653d305e2830302c00b6e29a49da52348634126fa128146211321d8c958139858fe551d911dcd8b4b52163b218b5a7bdc0e8b21dde5a50780a718811cdcf083093df7a214d1fa0b204ea8da10000001abf5fbe1171f681bb55925980057ce17f1d585817f1e85a46986625c6edd004a84ebfa246cadbe1c4c7a8e7647847c1db6d0bfe8b24bb31"]) mount(&(0x7f0000000200)=@sg0, &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)='qnx6\x00', 0x800000, &(0x7f00000004c0)='fsmagic') mkdirat(r0, &(0x7f0000000740)='./file0/file0\x00', 0x0) mount$9p_unix(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x230820, &(0x7f0000000600)={'trans=unix,', {[{@cache_none}, {@uname={'uname', 0x3d, '%,'}}, {@mmap}, {@debug={'debug', 0x3d, 0x27}}, {@debug={'debug', 0x3d, 0x7}}, {@cachetag={'cachetag', 0x3d, 'rootcontext'}}, {@posixacl}, {@posixacl}, {@cache_mmap}, {@cache_fscache}], [{@euid_lt={'euid<', 0xee00}}, {@obj_type={'obj_type', 0x3d, 'mode'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x62, 0x36, 0x32, 0x31, 0x39, 0x0, 0x35], 0x2d, [0x66, 0x64, 0x33, 0x36], 0x2d, [0x63, 0x38, 0x64, 0x33], 0x2d, [0x31, 0x35, 0x9, 0x39], 0x2d, [0x35, 0x52, 0x65, 0x0, 0x63, 0x62, 0x65, 0x38]}}}, {@euid_lt}]}}) rmdir(&(0x7f0000000500)='./file0\x00') 10:25:04 executing program 7: perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14) dup2(r0, r1) 10:25:04 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:25:04 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 10:25:04 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:25:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:25:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:25:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) [ 327.903925] ext4: Bad value for 'stripe' [ 327.906846] ext4: Unknown parameter 'trans' [ 327.913452] ext4: Bad value for 'stripe' [ 327.914003] ext4: Unknown parameter 'trans' 10:25:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:25:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/snmp6\x00') r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f0000000100)={&(0x7f0000000040)=""/55, 0x37}) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {r2}}, './file0\x00'}) ioctl$RTC_AIE_ON(r3, 0x7001) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x13, r2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc3, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x2410, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0xffffffffffffffff}}, 0x0, 0x0, r2, 0x2) close_range(r0, 0xffffffffffffffff, 0x0) 10:25:05 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x9, &(0x7f0000000940)=[{&(0x7f0000000280)="47c4e9918f9f177542957d08445d2bc034d9d6be2938756761cb351c159d2a3c7e94ec1e882b4913a10be1de667db4975b82be338bfedaff7b67a6ab82646d3b34b5fd7871fb50069ccf672de1642508296d975a0e6869ba416f7d4f62101a5cb934e1743fba5a8607d7", 0x6a, 0x8}, {&(0x7f0000000440)="a03dc0fe54a47a0834a23290b65a33897d8dc27f5d8c2244ca6e1d0282ce25c486a91518f9dc9eedc2352e3d22b1c4a32e47c4f28e87e14f9911ad475ba860e4e59e069ecfeaf5d83c278c7428f39144bf15a7eca0015b393eb9ac07000500e875883a89aa9b4b91cbf7ff137e670023f59443d6d9fcd0", 0x77, 0x1}, {&(0x7f0000000300), 0x0, 0x7}, {&(0x7f00000004c0)="329d41435bf434852c40154d3ad6e2dae91d20ee98d3fb1349d5d36462088f41c913a70a8b7fd1f86a7d7c42de9391867e2ed2c940541eb49bed053e1e6d70818ab3ab94566af5d99bd53ca5200d29cec81c164ff861f6c27a0d8704e6701a6ea5e2bd015412523a946e375a98e690c254799269deacd821284172e958b77f3667b13064925d9eed2a71ffc042576386bac6a28a3b79508a9edcb6179d20f21612c7e5a7ea5c94de2eb3fa530a", 0xad, 0x9}, {&(0x7f0000000580)="2a80d9b3c4ad5580779f69d16ebc837cb4171120897943dda5dc", 0x1a, 0x6d3}, {&(0x7f00000005c0)="5c1fec47d1a956512bb68c5109f402a8b722324a5accc3c4464e42bddbec40cd90e1", 0x22, 0x7}, {&(0x7f0000000600)="cebec107cc7eca38aabaf46176cf5b012990e7e31598cb055db50feadc", 0x1d, 0x6}, {&(0x7f0000000640)="711b364e56c382fdf9aab812f4727e448bc62f90465e7137cfb53097ba349eb2c5da18400f31e743d04952472e139664109dbcbd123ab931d84bb378f9241435054ee52dc1d27095760f32e3e7783a0999707efbc8480e19c21f0629b544c786f44a035ea6d65f07e1e2c94a08bc1143f8db528485f3bef4cd553d86352e4936beddbec6d291b38f0e1b431dae964dd4cbc1b9e6572092ae1864f935a6ebd2698c91f40f7ee137f5b759c4577594e0af747b410c0019809ea43167e5e4120e6a67a4cd55e59c7a0a", 0xc8, 0x9}, {&(0x7f0000000840)="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", 0xfb, 0x7}], 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:25:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) [ 328.061050] loop4: detected capacity change from 0 to 1 [ 328.066252] audit: type=1400 audit(1690885505.126:15): avc: denied { read } for pid=4702 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 328.069971] EXT4-fs: Ignoring removed orlov option [ 328.087927] EXT4-fs (loop4): unable to read superblock [ 328.099278] loop3: detected capacity change from 0 to 6 10:25:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:25:05 executing program 7: perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14) dup2(r0, r1) 10:25:05 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:25:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:25:05 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:25:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 328.250716] loop4: detected capacity change from 0 to 1 [ 328.256730] EXT4-fs: Ignoring removed orlov option [ 328.263795] EXT4-fs (loop4): unable to read superblock 10:25:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 10:25:18 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x8, &(0x7f0000000940)=[{&(0x7f0000000280)="47c4e9918f9f177542957d08445d2bc034d9d6be2938756761cb351c159d2a3c7e94ec1e882b4913a10be1de667db4975b82be338bfedaff7b67a6ab82646d3b34b5fd7871fb50069ccf672de1642508296d975a0e6869ba416f7d4f62101a5cb934e1743fba5a8607d7", 0x6a, 0x8}, {&(0x7f0000000440)="a03dc0fe54a47a0834a23290b65a33897d8dc27f5d8c2244ca6e1d0282ce25c486a91518f9dc9eedc2352e3d22b1c4a32e47c4f28e87e14f9911ad475ba860e4e59e069ecfeaf5d83c278c7428f39144bf15a7eca0015b393eb9ac07000500e875883a89aa9b4b91cbf7ff137e670023f59443d6d9fcd0", 0x77, 0x1}, {&(0x7f0000000300), 0x0, 0x7}, {&(0x7f00000004c0)="329d41435bf434852c40154d3ad6e2dae91d20ee98d3fb1349d5d36462088f41c913a70a8b7fd1f86a7d7c42de9391867e2ed2c940541eb49bed053e1e6d70818ab3ab94566af5d99bd53ca5200d29cec81c164ff861f6c27a0d8704e6701a6ea5e2bd015412523a946e375a98e690c254799269deacd821284172e958b77f3667b13064925d9eed2a71ffc042576386bac6a28a3b79508a9edcb6179d20f21612c7e5a7ea5c94de2eb3fa530a", 0xad, 0x9}, {&(0x7f0000000580)="2a80d9b3c4ad5580779f69d16ebc837cb4171120897943dda5dc", 0x1a, 0x6d3}, {&(0x7f00000005c0)="5c1fec47d1a956512bb68c5109f402a8b722324a5accc3c4464e42bddbec40cd90e1", 0x22, 0x7}, {&(0x7f0000000600)="cebec107cc7eca38aabaf46176cf5b012990e7e31598cb055db50feadc", 0x1d, 0x6}, {&(0x7f0000000640)="711b364e56c382fdf9aab812f4727e448bc62f90465e7137cfb53097ba349eb2c5da18400f31e743d04952472e139664109dbcbd123ab931d84bb378f9241435054ee52dc1d27095760f32e3e7783a0999707efbc8480e19c21f0629b544c786f44a035ea6d65f07e1e2c94a08bc1143f8db528485f3bef4cd553d86352e4936beddbec6d291b38f0e1b431dae964dd4cbc1b9e6572092ae1864f935a6ebd2698c91f40f7ee137f5b759c4577594e0af747b410c0019809ea43167e5e4120e6a67a4cd55e59c7a0a", 0xc8, 0x9}], 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:25:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:25:18 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:25:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:25:18 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:25:18 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:25:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012800)=ANY=[]) [ 341.176014] loop3: detected capacity change from 0 to 6 10:25:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 341.208999] No source specified [ 341.257073] loop4: detected capacity change from 0 to 1 [ 341.262956] EXT4-fs: Ignoring removed orlov option [ 341.278690] EXT4-fs (loop4): unable to read superblock 10:25:18 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, 0x0, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:25:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012800)=ANY=[]) 10:25:18 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x7, &(0x7f0000000940)=[{&(0x7f0000000280)="47c4e9918f9f177542957d08445d2bc034d9d6be2938756761cb351c159d2a3c7e94ec1e882b4913a10be1de667db4975b82be338bfedaff7b67a6ab82646d3b34b5fd7871fb50069ccf672de1642508296d975a0e6869ba416f7d4f62101a5cb934e1743fba5a8607d7", 0x6a, 0x8}, {&(0x7f0000000440)="a03dc0fe54a47a0834a23290b65a33897d8dc27f5d8c2244ca6e1d0282ce25c486a91518f9dc9eedc2352e3d22b1c4a32e47c4f28e87e14f9911ad475ba860e4e59e069ecfeaf5d83c278c7428f39144bf15a7eca0015b393eb9ac07000500e875883a89aa9b4b91cbf7ff137e670023f59443d6d9fcd0", 0x77, 0x1}, {&(0x7f0000000300), 0x0, 0x7}, {&(0x7f00000004c0)="329d41435bf434852c40154d3ad6e2dae91d20ee98d3fb1349d5d36462088f41c913a70a8b7fd1f86a7d7c42de9391867e2ed2c940541eb49bed053e1e6d70818ab3ab94566af5d99bd53ca5200d29cec81c164ff861f6c27a0d8704e6701a6ea5e2bd015412523a946e375a98e690c254799269deacd821284172e958b77f3667b13064925d9eed2a71ffc042576386bac6a28a3b79508a9edcb6179d20f21612c7e5a7ea5c94de2eb3fa530a", 0xad, 0x9}, {&(0x7f0000000580)="2a80d9b3c4ad5580779f69d16ebc837cb4171120897943dda5dc", 0x1a, 0x6d3}, {&(0x7f00000005c0)="5c1fec47d1a956512bb68c5109f402a8b722324a5accc3c4464e42bddbec40cd90e1", 0x22, 0x7}, {&(0x7f0000000600)="cebec107cc7eca38aabaf46176cf5b012990e7e31598cb055db50feadc", 0x1d, 0x6}], 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) [ 341.389096] No source specified [ 341.397033] loop3: detected capacity change from 0 to 6 10:25:30 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:25:30 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, 0x0, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:25:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:25:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:25:30 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 10:25:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:25:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012800)=ANY=[]) 10:25:30 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x6, &(0x7f0000000940)=[{&(0x7f0000000280)="47c4e9918f9f177542957d08445d2bc034d9d6be2938756761cb351c159d2a3c7e94ec1e882b4913a10be1de667db4975b82be338bfedaff7b67a6ab82646d3b34b5fd7871fb50069ccf672de1642508296d975a0e6869ba416f7d4f62101a5cb934e1743fba5a8607d7", 0x6a, 0x8}, {&(0x7f0000000440)="a03dc0fe54a47a0834a23290b65a33897d8dc27f5d8c2244ca6e1d0282ce25c486a91518f9dc9eedc2352e3d22b1c4a32e47c4f28e87e14f9911ad475ba860e4e59e069ecfeaf5d83c278c7428f39144bf15a7eca0015b393eb9ac07000500e875883a89aa9b4b91cbf7ff137e670023f59443d6d9fcd0", 0x77, 0x1}, {&(0x7f0000000300), 0x0, 0x7}, {&(0x7f00000004c0)="329d41435bf434852c40154d3ad6e2dae91d20ee98d3fb1349d5d36462088f41c913a70a8b7fd1f86a7d7c42de9391867e2ed2c940541eb49bed053e1e6d70818ab3ab94566af5d99bd53ca5200d29cec81c164ff861f6c27a0d8704e6701a6ea5e2bd015412523a946e375a98e690c254799269deacd821284172e958b77f3667b13064925d9eed2a71ffc042576386bac6a28a3b79508a9edcb6179d20f21612c7e5a7ea5c94de2eb3fa530a", 0xad, 0x9}, {&(0x7f0000000580)="2a80d9b3c4ad5580779f69d16ebc837cb4171120897943dda5dc", 0x1a, 0x6d3}, {&(0x7f00000005c0)="5c1fec47d1a956512bb68c5109f402a8b722324a5accc3c4464e42bddbec40cd90e1", 0x22, 0x7}], 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) [ 353.002473] No source specified [ 353.026101] loop3: detected capacity change from 0 to 6 10:25:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)=ANY=[]) [ 353.104969] loop4: detected capacity change from 0 to 1 [ 353.118122] EXT4-fs: Ignoring removed orlov option 10:25:30 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x5, &(0x7f0000000940)=[{&(0x7f0000000280)="47c4e9918f9f177542957d08445d2bc034d9d6be2938756761cb351c159d2a3c7e94ec1e882b4913a10be1de667db4975b82be338bfedaff7b67a6ab82646d3b34b5fd7871fb50069ccf672de1642508296d975a0e6869ba416f7d4f62101a5cb934e1743fba5a8607d7", 0x6a, 0x8}, {&(0x7f0000000440)="a03dc0fe54a47a0834a23290b65a33897d8dc27f5d8c2244ca6e1d0282ce25c486a91518f9dc9eedc2352e3d22b1c4a32e47c4f28e87e14f9911ad475ba860e4e59e069ecfeaf5d83c278c7428f39144bf15a7eca0015b393eb9ac07000500e875883a89aa9b4b91cbf7ff137e670023f59443d6d9fcd0", 0x77, 0x1}, {&(0x7f0000000300), 0x0, 0x7}, {&(0x7f00000004c0)="329d41435bf434852c40154d3ad6e2dae91d20ee98d3fb1349d5d36462088f41c913a70a8b7fd1f86a7d7c42de9391867e2ed2c940541eb49bed053e1e6d70818ab3ab94566af5d99bd53ca5200d29cec81c164ff861f6c27a0d8704e6701a6ea5e2bd015412523a946e375a98e690c254799269deacd821284172e958b77f3667b13064925d9eed2a71ffc042576386bac6a28a3b79508a9edcb6179d20f21612c7e5a7ea5c94de2eb3fa530a", 0xad, 0x9}, {&(0x7f0000000580)="2a80d9b3c4ad5580779f69d16ebc837cb4171120897943dda5dc", 0x1a, 0x6d3}], 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) [ 353.143922] EXT4-fs (loop4): unable to read superblock 10:25:30 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, 0x0, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:25:30 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b6490872e4327204cb0800be000000000000061a4a4ef2db077faaaaaaaaaa1220403fbd4d501d99aaaaaaaaaa1003099912e7ffff00ffffffffffff1f200d2c060300f9000000000000fca36cfcb50400a3e125a6cb33906c66f9a4677dab2e619eb3227d8d0545853ad0db965fab9a98f3116b4e8826616d7afd07fc0c57f469ae75a5d0b205cb9db972a00f2b2b447d7413fd8451fcecd7f40349719f2d7679af677e0a3bb6769da7b9c210fa03d7719f1065fb8ea50229d8deaa1c24943d05ca8f"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x8) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x5d, 0x62, 0x1a, 0x0, 0x2, 0x1c80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x6, 0x7fff}, 0x200, 0x2, 0x5, 0x3, 0x4, 0x6, 0x1, 0x0, 0xca3, 0x0, 0x6}, r4, 0x5, r3, 0x5) r5 = syz_open_dev$vcsn(&(0x7f0000000300), 0x7f3, 0x202) ppoll(&(0x7f0000000340)=[{r1, 0x558}, {r5, 0x540c}, {r0, 0x40}], 0x3, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)={[0x3]}, 0x8) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x7, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1c62}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) [ 353.243394] loop3: detected capacity change from 0 to 6 10:25:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:25:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)=ANY=[]) 10:25:30 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000040), 0x33d480, 0x0) ioctl$DVD_READ_STRUCT(0xffffffffffffffff, 0x5390, 0x0) ioctl$DVD_READ_STRUCT(r0, 0x5390, &(0x7f0000000c40)=@manufact={0x4, 0x0, 0x800, "933fe8aa23123c27e3decffae6b366bea4566672b08eef419d0d3da8c59bed139a1e33c5bc01a09e3edeade682d183f42dc5aafc5672d7d071345a46e5b56153ff1bcf0c6a8199b6edce2f24674f77b72b04ddf2292411a2d990bf2aa8e4010e0d7ca091ba04f9b2cda3249390efeca98d9f69d1df70e558b1473aee3f2e5754e0a17b6c9b92de6ecbf23c9c4cb7610f548d18ec4b988341cf89b033dae8fe1cd146247e267713877554ee36fc57c6f2946e654693a61a105c83a52c23414c0b1777eb7ce63daf949aa7cf6e6cafac361f294399abb7b6c92bff950404546d9d1cf152e40f9ad90331b0cfbf73983ed4cf828a89e93eecaf605fbab1fe8b6adc515df6859bf1b9210bc045d6ff34359c9e0119e3f07f2eed2a66168d1d42b5ae793618f88002a4f701cc9d842eef69f21990cfe53cf7cb8d7b04717cf1e77fa18b7b07f21166026cd65448b409293908a70bfdb67bf2e2184d9fdd753676614c921be28e22b0290858c2a49ef2808da046d35d66d7d2114d30e78182245d4ab88a488ec1ebf4022d9890775e41eada7e588520c411b28a62dd70de4f4bd9702fa2ecbaecd29d3254ff9a815c69d0d30de78319ada420dbb8dcb7e549d29ae09b78505ddf8ea7fa6c2d7877d590349f96763a57da0199eda186e21675035cac727defeafb46c191ff1bbbd8fbd30d29b9fdbb502fe6201ede2185862d8a12687ad00bc2da155277e580348389ef3db6ec339f85a87e2a6227fc7af493af92ac453a0ac6788c513e5b5ec4a68bd33615de6b236d1cb41108cbb48409d035df1dd4603bca70346f74c9c486f1ba577b301823cab51a0d56615b28099ccfc8e2e4cc478fb521c9b81ac6f61c99c3289d3506a3f98e931d12f2c616966a6a3adf9327be7a991a6877704f2cdecd0354a851777d3545e533c3c57462f3d75d13a33dd99a27918b46ab6977310d94459ec3909b337fdfe410e33f0be5bec529416adfe0898814d3b19dd3a95b014b7539be446d3be1213d4f73ffacb36767b704e7887f38f1a7f26de007b993c37f622d656b010095dc3594ca036088cceeb2e4d22afaff213976a7f9a794320fbc82855005fce8365255803063d4692561a6cb3c48ce631e1b6ce62dbefdcfcbe961425cc8cb6e7da47130421a695bf4c9aadf41d431d0be077db78e143a7b83437c6874b4ed56ebc5b3af211fd4287e38f046c15781761a4f510bc7786d1b6de09b04fd7f83ce6072a6a0f8a5452c0caab705dd4bae3cbbf10f96c109f493b41a9859a4d2adb78d60d5113305ec549e5abfebd44addf28527574b36309bc9aaa8e0864dabe5e597de0d7d28c3b6160e82cbbc001023b7160e029539ec98ce895db7a9cf0a26b4e7efeca5c3eb0390dd8370d28377cfb6caa20d3152a1983d2bc6a9a1de66e10559b5b9a5f742e4297113cb3b9d940eedbb81aed2c61e02fb0a285783b8df127e18cfdd9682b2844c17598e1d66ec7d4d4615e0fc7b9c904ce0fbf2db6ad2bf09baf81d05d4cf45e0e541ecbdefcf46bb5879ea33c141362533ef9cb808fad1ed20eeee9dd56c36bf02b1ce8fd0ef84f819c6db062606a009ab07282dfdae8b20fbc3cd7b6eee75e81001902eb143b98d94d8fef8df540409d3987dee1bbcb6d2aad8a5209e8cbd799c845078777933e981fe954586fcc9724659b13a1cec6da7a89f35aead9158a4657a70c26a19f3749bb8a8c598efbad3b0d2ab68f206b31d46a92b148800022e39f497973df6c8a04e015763161317e25ee0d81824faf504fbafd6d1f6c6038b1488da4cdfb8000896e4fb640f6f74f1beb7b18ecc39c88ecd9f929212d203c0c0336ac26298699a93ec817b6a2b0e85978c924c62d3275e6f846454fc2750f8b498ffda63ea0ab0b1ad65fd0d8d62085f476e5229f0cfdb978e0db43622ca0213e6d46fe203faf3269795e745699e467c85361e95cdd8ba4b6e460b6afb6fc56b52d26476cc11a93c67a9fb3a6bbd40d17143edf67cb137310608411349aff8d27e77bfc24d8d75da278f3435d80841bd19ecc42c64d01eaf35adb6645b2548aa379f73929d6288f7faabfc271aadc685017f6e42eee854e74159a06add1cc77d67d888b3a1436f0e553fed1e7c93b648d24d3c69eaae560023138a690268b53c1dccac6202ed7a2c53fb0d02928fae34f50e27f8c59e98e7a3622428c58682748973b29ef0f1de9dcf34cc7faaa18d1d78dd39cd884d51897f9244676ebbeb09075f15c4318af2017db6b6f594657bbe5d3ade4045ef63666a525d3ff2b7d41b2a830ce638de8a5d4661d4d3391dd42b6a6a8c4ff48113c2042e1799c9b6b59f0aa29c0a121a1fcf2b6bc1a7fa4850c15e2d3d3635d5cba2596d7dca7f4ba282be2f33bc3c370ab01c39ca83496ee3e86f3680b9933aad63c8c565a06b980af38ba9bdb4b05de9e58a3cd4bc0465d150d2649d211dbe5e4bc57519ea9c03bdc7163031b1fb7b7d2de53938f46ee6ef5ffb55f3456a73ed48b475de79dcf5303a984ac5b59cd43055956999873375af0fee58e898d0aa961a6101a89e5b37f528a4b87941eb3939518f68fa13e29936551ff265b9520d3787c8e4bccc81d8da81b50f1a3096299b52e0e2a8577e501acce1208310b93586a2d84ead7df820790399a91a97404e864761cf61cdb4e4758ccdb95046afc7ab2aefd973a7d6fade08952dcc25b98f14ff43809842a74f4d423157047032718aa3348067e9f7f2fce9c138912841e6867808577b0b2d88abeaf11059238b18ce99bed070ec4e4c81cabcdf1983b4876144f8b00bcf3fb1148f29a93e8a8c6aa8572b96a6d02ccad0232337db6933c6fbc6f4c0b085a8dcd42f0b0327ad6333ad8336274d82a467b96dd6ba1741d2df"}) [ 353.274451] Bluetooth: Unexpected continuation frame (len 10) 10:25:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:25:30 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x4, &(0x7f0000000940)=[{&(0x7f0000000280)="47c4e9918f9f177542957d08445d2bc034d9d6be2938756761cb351c159d2a3c7e94ec1e882b4913a10be1de667db4975b82be338bfedaff7b67a6ab82646d3b34b5fd7871fb50069ccf672de1642508296d975a0e6869ba416f7d4f62101a5cb934e1743fba5a8607d7", 0x6a, 0x8}, {&(0x7f0000000440)="a03dc0fe54a47a0834a23290b65a33897d8dc27f5d8c2244ca6e1d0282ce25c486a91518f9dc9eedc2352e3d22b1c4a32e47c4f28e87e14f9911ad475ba860e4e59e069ecfeaf5d83c278c7428f39144bf15a7eca0015b393eb9ac07000500e875883a89aa9b4b91cbf7ff137e670023f59443d6d9fcd0", 0x77, 0x1}, {&(0x7f0000000300), 0x0, 0x7}, {&(0x7f00000004c0)="329d41435bf434852c40154d3ad6e2dae91d20ee98d3fb1349d5d36462088f41c913a70a8b7fd1f86a7d7c42de9391867e2ed2c940541eb49bed053e1e6d70818ab3ab94566af5d99bd53ca5200d29cec81c164ff861f6c27a0d8704e6701a6ea5e2bd015412523a946e375a98e690c254799269deacd821284172e958b77f3667b13064925d9eed2a71ffc042576386bac6a28a3b79508a9edcb6179d20f21612c7e5a7ea5c94de2eb3fa530a", 0xad, 0x9}], 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:25:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000012800)=ANY=[]) 10:25:30 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:25:30 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 353.522974] loop4: detected capacity change from 0 to 1 [ 353.541092] EXT4-fs: Ignoring removed orlov option 10:25:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 353.565777] EXT4-fs (loop4): unable to read superblock [ 353.776826] loop7: detected capacity change from 0 to 1 [ 353.785120] EXT4-fs: Ignoring removed orlov option [ 353.795112] EXT4-fs (loop7): unable to read superblock [ 354.079790] Bluetooth: Unexpected continuation frame (len 10) 10:25:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:25:45 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x8) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x5d, 0x62, 0x1a, 0x0, 0x2, 0x1c80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x6, 0x7fff}, 0x200, 0x2, 0x5, 0x3, 0x4, 0x6, 0x1, 0x0, 0xca3, 0x0, 0x6}, r4, 0x5, r3, 0x5) r5 = syz_open_dev$vcsn(&(0x7f0000000300), 0x7f3, 0x202) ppoll(&(0x7f0000000340)=[{r1, 0x558}, {r5, 0x540c}, {r0, 0x40}], 0x3, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)={[0x3]}, 0x8) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x7, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1c62}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) 10:25:45 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:25:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:25:45 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:25:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:25:45 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:25:45 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x3, &(0x7f0000000940)=[{&(0x7f0000000280)="47c4e9918f9f177542957d08445d2bc034d9d6be2938756761cb351c159d2a3c7e94ec1e882b4913a10be1de667db4975b82be338bfedaff7b67a6ab82646d3b34b5fd7871fb50069ccf672de1642508296d975a0e6869ba416f7d4f62101a5cb934e1743fba5a8607d7", 0x6a, 0x8}, {&(0x7f0000000440)="a03dc0fe54a47a0834a23290b65a33897d8dc27f5d8c2244ca6e1d0282ce25c486a91518f9dc9eedc2352e3d22b1c4a32e47c4f28e87e14f9911ad475ba860e4e59e069ecfeaf5d83c278c7428f39144bf15a7eca0015b393eb9ac07000500e875883a89aa9b4b91cbf7ff137e670023f59443d6d9fcd0", 0x77, 0x1}, {&(0x7f0000000300), 0x0, 0x7}], 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) [ 368.502156] loop4: detected capacity change from 0 to 1 [ 368.561824] EXT4-fs: Ignoring removed orlov option [ 368.563977] loop7: detected capacity change from 0 to 1 [ 368.568111] EXT4-fs: Ignoring removed orlov option [ 368.580841] Bluetooth: Unexpected continuation frame (len 10) [ 368.586003] EXT4-fs (loop4): unable to read superblock [ 368.587846] EXT4-fs (loop7): unable to read superblock 10:26:00 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:00 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x8) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x5d, 0x62, 0x1a, 0x0, 0x2, 0x1c80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x6, 0x7fff}, 0x200, 0x2, 0x5, 0x3, 0x4, 0x6, 0x1, 0x0, 0xca3, 0x0, 0x6}, r4, 0x5, r3, 0x5) r5 = syz_open_dev$vcsn(&(0x7f0000000300), 0x7f3, 0x202) ppoll(&(0x7f0000000340)=[{r1, 0x558}, {r5, 0x540c}, {r0, 0x40}], 0x3, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)={[0x3]}, 0x8) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x7, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1c62}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) 10:26:00 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r0}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:26:00 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:00 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:26:00 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000940)=[{&(0x7f0000000280)="47c4e9918f9f177542957d08445d2bc034d9d6be2938756761cb351c159d2a3c7e94ec1e882b4913a10be1de667db4975b82be338bfedaff7b67a6ab82646d3b34b5fd7871fb50069ccf672de1642508296d975a0e6869ba416f7d4f62101a5cb934e1743fba5a8607d7", 0x6a, 0x8}, {&(0x7f0000000440)="a03dc0fe54a47a0834a23290b65a33897d8dc27f5d8c2244ca6e1d0282ce25c486a91518f9dc9eedc2352e3d22b1c4a32e47c4f28e87e14f9911ad475ba860e4e59e069ecfeaf5d83c278c7428f39144bf15a7eca0015b393eb9ac07000500e875883a89aa9b4b91cbf7ff137e670023f59443d6d9fcd0", 0x77, 0x1}], 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) [ 383.386108] loop4: detected capacity change from 0 to 1 [ 383.389502] EXT4-fs: Ignoring removed orlov option [ 383.391250] EXT4-fs (loop4): unable to read superblock [ 383.394711] loop7: detected capacity change from 0 to 1 [ 383.396077] EXT4-fs: Ignoring removed orlov option [ 383.397879] EXT4-fs (loop7): unable to read superblock 10:26:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:00 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 383.491795] loop4: detected capacity change from 0 to 1 [ 383.496250] EXT4-fs: Ignoring removed orlov option [ 383.496904] EXT4-fs (loop4): unable to read superblock [ 383.504546] Bluetooth: Unexpected continuation frame (len 10) 10:26:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:26:00 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:00 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000940)=[{&(0x7f0000000280)="47c4e9918f9f177542957d08445d2bc034d9d6be2938756761cb351c159d2a3c7e94ec1e882b4913a10be1de667db4975b82be338bfedaff7b67a6ab82646d3b34b5fd7871fb50069ccf672de1642508296d975a0e6869ba416f7d4f62101a5cb934e1743fba5a8607d7", 0x6a, 0x8}], 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) [ 383.555856] loop7: detected capacity change from 0 to 1 [ 383.562766] EXT4-fs: Ignoring removed orlov option [ 383.573827] EXT4-fs (loop7): unable to read superblock 10:26:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r0}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:26:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 383.653481] loop4: detected capacity change from 0 to 1 [ 383.664110] EXT4-fs: Ignoring removed orlov option [ 383.674580] EXT4-fs (loop4): unable to read superblock 10:26:00 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:00 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x840, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:26:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400), 0x0, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:26:12 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r0}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:26:12 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:12 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:12 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:26:12 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x8) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x5d, 0x62, 0x1a, 0x0, 0x2, 0x1c80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x6, 0x7fff}, 0x200, 0x2, 0x5, 0x3, 0x4, 0x6, 0x1, 0x0, 0xca3, 0x0, 0x6}, r4, 0x5, r3, 0x5) r5 = syz_open_dev$vcsn(&(0x7f0000000300), 0x7f3, 0x202) ppoll(&(0x7f0000000340)=[{r1, 0x558}, {r5, 0x540c}, {r0, 0x40}], 0x3, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)={[0x3]}, 0x8) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x7, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1c62}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) [ 395.959463] loop4: detected capacity change from 0 to 1 [ 395.967098] EXT4-fs: Ignoring removed orlov option [ 395.973764] EXT4-fs (loop4): unable to read superblock [ 396.026025] loop7: detected capacity change from 0 to 1 10:26:13 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0) [ 396.082954] EXT4-fs: Ignoring removed orlov option 10:26:13 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 396.114904] EXT4-fs (loop7): unable to read superblock 10:26:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400), 0x0, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) [ 396.151430] loop4: detected capacity change from 0 to 1 [ 396.166014] Bluetooth: Unexpected continuation frame (len 10) [ 396.168678] EXT4-fs: Ignoring removed orlov option [ 396.172051] EXT4-fs (loop4): unable to read superblock 10:26:13 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:13 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:26:13 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0) 10:26:13 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400), 0x0, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:26:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 396.395570] loop4: detected capacity change from 0 to 1 [ 396.404480] EXT4-fs: Ignoring removed orlov option [ 396.416699] EXT4-fs (loop4): unable to read superblock [ 396.432354] loop7: detected capacity change from 0 to 1 [ 396.455777] EXT4-fs: Ignoring removed orlov option [ 396.459985] EXT4-fs (loop7): unable to read superblock 10:26:13 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:29 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x8) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x5d, 0x62, 0x1a, 0x0, 0x2, 0x1c80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x6, 0x7fff}, 0x200, 0x2, 0x5, 0x3, 0x4, 0x6, 0x1, 0x0, 0xca3, 0x0, 0x6}, r4, 0x5, r3, 0x5) r5 = syz_open_dev$vcsn(&(0x7f0000000300), 0x7f3, 0x202) ppoll(&(0x7f0000000340)=[{r1, 0x558}, {r5, 0x540c}, {r0, 0x40}], 0x3, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)={[0x3]}, 0x8) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x7, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1c62}, 0x1c) 10:26:29 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="030000", 0x3, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:26:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:26:29 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:29 executing program 7: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:29 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, 0x0, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:29 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0) [ 412.393109] loop7: detected capacity change from 0 to 1 [ 412.416225] EXT4-fs: Ignoring removed orlov option 10:26:29 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) [ 412.430420] EXT4-fs (loop7): unable to read superblock [ 412.448875] loop4: detected capacity change from 0 to 1 [ 412.456633] EXT4-fs: Ignoring removed orlov option [ 412.459756] EXT4-fs (loop4): unable to read superblock 10:26:29 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, 0x0, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:26:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="030000", 0x3, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:26:29 executing program 7: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:29 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:26:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:29 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, 0x0, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 412.589523] Bluetooth: Unexpected continuation frame (len 10) [ 412.593629] loop7: detected capacity change from 0 to 1 [ 412.600394] EXT4-fs: Ignoring removed orlov option [ 412.602244] EXT4-fs (loop7): unable to read superblock [ 412.649651] loop4: detected capacity change from 0 to 1 [ 412.661324] EXT4-fs: Ignoring removed orlov option [ 412.666307] EXT4-fs (loop4): unable to read superblock 10:26:42 executing program 7: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:42 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x8) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x5d, 0x62, 0x1a, 0x0, 0x2, 0x1c80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x6, 0x7fff}, 0x200, 0x2, 0x5, 0x3, 0x4, 0x6, 0x1, 0x0, 0xca3, 0x0, 0x6}, r4, 0x5, r3, 0x5) r5 = syz_open_dev$vcsn(&(0x7f0000000300), 0x7f3, 0x202) ppoll(&(0x7f0000000340)=[{r1, 0x558}, {r5, 0x540c}, {r0, 0x40}], 0x3, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)={[0x3]}, 0x8) 10:26:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="030000", 0x3, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:26:42 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffa}}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:26:42 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:42 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:26:42 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 425.944601] loop4: detected capacity change from 0 to 1 [ 425.946931] EXT4-fs: Ignoring removed orlov option [ 425.948871] EXT4-fs (loop4): unable to read superblock [ 425.973216] Bluetooth: Unexpected continuation frame (len 10) 10:26:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03000000", 0x4, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) [ 425.986615] loop7: detected capacity change from 0 to 1 10:26:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 425.997802] EXT4-fs: Ignoring removed orlov option [ 426.002522] EXT4-fs (loop7): unable to read superblock [ 426.051043] loop4: detected capacity change from 0 to 1 [ 426.054918] EXT4-fs: Ignoring removed orlov option [ 426.057905] EXT4-fs (loop4): unable to read superblock 10:26:43 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}, {@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) [ 426.103857] loop7: detected capacity change from 0 to 1 10:26:43 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:26:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 426.109988] EXT4-fs: Ignoring removed orlov option [ 426.113543] EXT4-fs (loop7): unable to read superblock 10:26:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03000000", 0x4, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:26:43 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:43 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03000000", 0x4, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) [ 426.225934] loop7: detected capacity change from 0 to 1 [ 426.229843] EXT4-fs: Ignoring removed orlov option [ 426.230553] EXT4-fs (loop7): unable to read superblock 10:26:43 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x8) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x5d, 0x62, 0x1a, 0x0, 0x2, 0x1c80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x6, 0x7fff}, 0x200, 0x2, 0x5, 0x3, 0x4, 0x6, 0x1, 0x0, 0xca3, 0x0, 0x6}, r4, 0x5, r3, 0x5) syz_open_dev$vcsn(&(0x7f0000000300), 0x7f3, 0x202) 10:26:43 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x5}], 0x0, &(0x7f0000012800)=ANY=[]) 10:26:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:26:43 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 426.336784] loop7: detected capacity change from 0 to 1 [ 426.347613] EXT4-fs: Ignoring removed orlov option [ 426.354930] loop4: detected capacity change from 0 to 1 [ 426.356525] EXT4-fs (loop7): unable to read superblock [ 426.365666] EXT4-fs: Ignoring removed orlov option [ 426.366295] Bluetooth: Unexpected continuation frame (len 10) [ 426.377353] EXT4-fs (loop4): unable to read superblock 10:26:56 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x8) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x5d, 0x62, 0x1a, 0x0, 0x2, 0x1c80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x6, 0x7fff}, 0x200, 0x2, 0x5, 0x3, 0x4, 0x6, 0x1, 0x0, 0xca3, 0x0, 0x6}, r4, 0x5, r3, 0x5) 10:26:56 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r4, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:56 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:26:56 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:26:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x5}], 0x0, &(0x7f0000012800)=ANY=[]) 10:26:56 executing program 7: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:56 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) [ 439.909101] loop7: detected capacity change from 0 to 1 [ 439.911745] loop4: detected capacity change from 0 to 1 [ 439.914059] EXT4-fs: Ignoring removed orlov option [ 439.916276] EXT4-fs: Ignoring removed orlov option [ 439.917528] EXT4-fs (loop7): unable to read superblock [ 439.918356] EXT4-fs (loop4): unable to read superblock [ 439.929530] Bluetooth: Unexpected continuation frame (len 10) 10:26:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x5}], 0x0, &(0x7f0000012800)=ANY=[]) 10:26:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:26:57 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000a40)={[{@nodots}, {@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) [ 440.035102] loop7: detected capacity change from 0 to 1 [ 440.037437] loop4: detected capacity change from 0 to 1 [ 440.039690] EXT4-fs: Ignoring removed orlov option [ 440.042270] EXT4-fs: Ignoring removed orlov option [ 440.043521] EXT4-fs (loop7): unable to read superblock [ 440.044854] EXT4-fs (loop4): unable to read superblock 10:27:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:27:09 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r4, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:27:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:27:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:27:09 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:27:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000a40)={[{@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:27:09 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:27:09 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) creat(&(0x7f0000000480)='./file0\x00', 0x8) [ 452.034453] FAT-fs (loop3): Unrecognized mount option "obj_role=0000:00:10.0" or missing value [ 452.045154] loop7: detected capacity change from 0 to 1 [ 452.049830] EXT4-fs: Ignoring removed orlov option [ 452.052497] EXT4-fs (loop7): unable to read superblock 10:27:09 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 452.068390] Bluetooth: Unexpected continuation frame (len 10) [ 452.078726] loop4: detected capacity change from 0 to 1 10:27:09 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r4, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:27:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:27:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:27:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 452.144695] loop7: detected capacity change from 0 to 1 [ 452.145928] EXT4-fs: Ignoring removed orlov option [ 452.146873] EXT4-fs (loop7): unable to read superblock 10:27:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000a40)={[{@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:27:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 452.219036] FAT-fs (loop3): Unrecognized mount option "obj_role=0000:00:10.0" or missing value [ 452.233148] loop7: detected capacity change from 0 to 1 [ 452.237522] EXT4-fs: Ignoring removed orlov option [ 452.242487] EXT4-fs (loop7): unable to read superblock 10:27:09 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 452.296332] loop4: detected capacity change from 0 to 1 10:27:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:27:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000a40)={[{@nodots}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) 10:27:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:27:09 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 452.343713] FAT-fs (loop3): Unrecognized mount option "obj_role=0000:00:10.0" or missing value [ 452.352914] loop7: detected capacity change from 0 to 1 [ 452.358534] EXT4-fs: Ignoring removed orlov option [ 452.360468] EXT4-fs (loop7): unable to read superblock 10:27:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:27:09 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:27:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000a40)={[{@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}, {@hash}]}) [ 452.490919] loop4: detected capacity change from 0 to 1 10:27:22 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:27:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:27:22 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:27:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:27:22 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:27:22 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) 10:27:22 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000a40)={[{@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}]}) 10:27:22 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 465.539285] loop4: detected capacity change from 0 to 1 [ 465.553003] loop7: detected capacity change from 0 to 1 [ 465.555881] EXT4-fs: Ignoring removed orlov option [ 465.557795] Bluetooth: Unexpected continuation frame (len 10) [ 465.563024] EXT4-fs (loop7): unable to read superblock 10:27:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:27:22 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000a40)={[{@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 10:27:22 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:27:22 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:27:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) [ 465.670998] loop4: detected capacity change from 0 to 1 [ 465.672046] loop7: detected capacity change from 0 to 1 [ 465.679374] EXT4-fs: Ignoring removed orlov option [ 465.680055] EXT4-fs (loop7): unable to read superblock 10:27:22 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:27:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 465.782850] loop4: detected capacity change from 0 to 1 10:27:36 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:27:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:27:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:27:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:27:36 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:27:36 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r4, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:27:36 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) dup(r0) 10:27:36 executing program 3: syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000a40)={[{@fat=@uid={'uid', 0x3d, 0xffffffffffffffff}}], [{@obj_role={'obj_role', 0x3d, '0000:00:10.0\x00'}}]}) [ 479.765684] EXT4-fs: Ignoring removed orlov option [ 479.772641] syz-executor.4: attempt to access beyond end of device [ 479.772641] loop4: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 479.781634] EXT4-fs (loop4): unable to read superblock [ 479.797683] Bluetooth: Unexpected continuation frame (len 10) [ 479.805460] loop7: detected capacity change from 0 to 1 [ 479.814987] EXT4-fs: Ignoring removed orlov option [ 479.818778] EXT4-fs (loop7): unable to read superblock 10:27:36 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:27:36 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:27:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:27:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 479.986336] loop7: detected capacity change from 0 to 1 [ 480.003800] EXT4-fs: Ignoring removed orlov option [ 480.006300] No source specified [ 480.040988] loop3: detected capacity change from 0 to 1 [ 480.052678] EXT4-fs: Ignoring removed orlov option [ 480.078524] EXT4-fs (loop3): unable to read superblock 10:27:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:27:50 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r0, &(0x7f00000001c0)=""/219, 0xdb) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r1, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) 10:27:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:27:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:27:50 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r4, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:27:50 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:27:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:27:50 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 493.185966] loop7: detected capacity change from 0 to 1 [ 493.216455] Bluetooth: Unexpected continuation frame (len 10) [ 493.246716] EXT4-fs: Ignoring removed orlov option [ 493.252318] No source specified 10:28:03 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:28:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:28:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:28:03 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r4, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:28:03 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r0, &(0x7f00000001c0)=""/219, 0xdb) syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) [ 506.369000] Bluetooth: Unexpected continuation frame (len 10) [ 506.372300] EXT4-fs: Ignoring removed orlov option [ 506.372686] No source specified [ 506.393269] loop7: detected capacity change from 0 to 1 10:28:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:28:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) [ 506.473782] EXT4-fs: Ignoring removed orlov option [ 506.478716] syz-executor.4: attempt to access beyond end of device [ 506.478716] loop4: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 506.484539] EXT4-fs (loop4): unable to read superblock 10:28:03 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b6490872e4327204cb0800be000000000000061a4a4ef2db077faaaaaaaaaa1220403fbd4d501d99aaaaaaaaaa1003099912e7ffff00ffffffffffff1f200d2c060300f9000000000000fca36cfcb50400a3e125a6cb33906c66f9a4677dab2e619eb3227d8d0545853ad0db965fab9a98f3116b4e8826616d7afd07fc0c57f469ae75a5d0b205cb9db972a00f2b2b447d7413fd8451fcecd7f40349719f2d7679af677e0a3bb6769da7b9c210fa03d7719f1065fb8ea50229d8deaa1c24943d05ca8f"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r0, &(0x7f00000001c0)=""/219, 0xdb) syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) 10:28:03 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r4, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 506.542473] Bluetooth: Unexpected continuation frame (len 10) 10:28:03 executing program 3: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r0, &(0x7f00000001c0)=""/219, 0xdb) syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) 10:28:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:28:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 506.607612] loop7: detected capacity change from 0 to 1 [ 506.624354] Bluetooth: Unexpected continuation frame (len 10) 10:28:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 506.667038] EXT4-fs: Ignoring removed orlov option [ 506.678470] syz-executor.4: attempt to access beyond end of device [ 506.678470] loop4: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 506.690607] EXT4-fs (loop4): unable to read superblock 10:28:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000", 0x1d, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:28:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:28:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 506.769892] loop7: detected capacity change from 0 to 1 10:28:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000", 0x2c, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:28:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:28:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:28:03 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r0, &(0x7f00000001c0)=""/219, 0xdb) [ 506.896767] loop7: detected capacity change from 0 to 1 10:28:03 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r2, 0x540a, 0x2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 506.907808] EXT4-fs: Ignoring removed orlov option [ 506.911453] syz-executor.4: attempt to access beyond end of device [ 506.911453] loop4: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 506.918294] EXT4-fs (loop4): unable to read superblock [ 506.920704] Bluetooth: Unexpected continuation frame (len 10) 10:28:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:28:04 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 506.979214] EXT4-fs: Ignoring removed orlov option [ 506.981687] syz-executor.7: attempt to access beyond end of device [ 506.981687] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 506.984213] EXT4-fs (loop7): unable to read superblock 10:28:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:28:17 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:17 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b6490872e4327204cb0800be000000000000061a4a4ef2db077faaaaaaaaaa1220403fbd4d501d99aaaaaaaaaa1003099912e7ffff00ffffffffffff1f200d2c060300f9000000000000fca36cfcb50400a3e125a6cb33906c66f9a4677dab2e619eb3227d8d0545853ad0db965fab9a98f3116b4e8826616d7afd07fc0c57f469ae75a5d0b205cb9db972a00f2b2b447d7413fd8451fcecd7f40349719f2d7679af677e0a3bb6769da7b9c210fa03d7719f1065fb8ea50229d8deaa1c24943d05ca8f"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) socket$inet6_udp(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') 10:28:17 executing program 3: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r0, &(0x7f00000001c0)=""/219, 0xdb) syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) 10:28:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:28:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 10:28:17 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r2, 0x540a, 0x2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000", 0x2c, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) [ 520.032887] Bluetooth: Unexpected continuation frame (len 10) 10:28:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000", 0x2c, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) [ 520.060353] Bluetooth: Unexpected continuation frame (len 10) [ 520.060502] EXT4-fs: Ignoring removed orlov option [ 520.069119] No source specified 10:28:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f465", 0x33, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:28:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 10:28:17 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r2, 0x540a, 0x2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f465", 0x33, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:28:17 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:28:17 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) socket$inet6_udp(0xa, 0x2, 0x0) 10:28:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f465", 0x33, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:28:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 520.270037] EXT4-fs: Ignoring removed orlov option [ 520.275280] No source specified [ 520.278112] Bluetooth: Unexpected continuation frame (len 10) 10:28:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:29 executing program 3: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b6490872e4327204cb0800be000000000000061a4a4ef2db077faaaaaaaaaa1220403fbd4d501d99aaaaaaaaaa1003099912e7ffff00ffffffffffff1f200d2c060300f9000000000000fca36cfcb50400a3e125a6cb33906c66f9a4677dab2e619eb3227d8d0545853ad0db965fab9a98f3116b4e8826616d7afd07fc0c57f469ae75a5d0b205cb9db972a00f2b2b447d7413fd8451fcecd7f40349719f2d7679af677e0a3bb6769da7b9c210fa03d7719f1065fb8ea50229d8deaa1c24943d05ca8f"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r0, &(0x7f00000001c0)=""/219, 0xdb) syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) 10:28:29 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) 10:28:29 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ff", 0x37, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:28:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:28:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 10:28:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 532.590957] EXT4-fs: Ignoring removed orlov option [ 532.592905] Bluetooth: Unexpected continuation frame (len 10) [ 532.596288] No source specified [ 532.608601] Bluetooth: Unexpected continuation frame (len 10) 10:28:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:28:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:28:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ff", 0x37, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:28:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}]}) 10:28:29 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:29 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b6490872e4327204cb0800be000000000000061a4a4ef2db077faaaaaaaaaa1220403fbd4d501d99aaaaaaaaaa1003099912e7ffff00ffffffffffff1f200d2c060300f9000000000000fca36cfcb50400a3e125a6cb33906c66f9a4677dab2e619eb3227d8d0545853ad0db965fab9a98f3116b4e8826616d7afd07fc0c57f469ae75a5d0b205cb9db972a00f2b2b447d7413fd8451fcecd7f40349719f2d7679af677e0a3bb6769da7b9c210fa03d7719f1065fb8ea50229d8deaa1c24943d05ca8f"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) [ 532.831541] Bluetooth: Unexpected continuation frame (len 10) [ 532.832427] EXT4-fs: Ignoring removed orlov option [ 532.834361] syz-executor.7: attempt to access beyond end of device [ 532.834361] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 532.839753] EXT4-fs (loop7): unable to read superblock [ 532.843225] EXT4-fs: Ignoring removed orlov option [ 532.848630] syz-executor.4: attempt to access beyond end of device [ 532.848630] loop4: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 532.861208] EXT4-fs (loop4): unable to read superblock 10:28:41 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:28:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:28:41 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:28:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ff", 0x37, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:28:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:28:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}]}) 10:28:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) [ 544.833543] Bluetooth: Unexpected continuation frame (len 10) [ 544.861533] EXT4-fs: Ignoring removed orlov option [ 544.863888] EXT4-fs: Ignoring removed orlov option [ 544.867089] syz-executor.7: attempt to access beyond end of device [ 544.867089] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 544.870328] syz-executor.4: attempt to access beyond end of device [ 544.870328] loop4: rw=4096, sector=2, nr_sectors = 2 limit=0 10:28:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 544.875857] EXT4-fs (loop7): unable to read superblock [ 544.886198] EXT4-fs (loop4): unable to read superblock 10:28:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:41 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b6490872e4327204cb0800be000000000000061a4a4ef2db077faaaaaaaaaa1220403fbd4d501d99aaaaaaaaaa1003099912e7ffff00ffffffffffff1f200d2c060300f9000000000000fca36cfcb50400a3e125a6cb33906c66f9a4677dab2e619eb3227d8d0545853ad0db965fab9a98f3116b4e8826616d7afd07fc0c57f469ae75a5d0b205cb9db972a00f2b2b447d7413fd8451fcecd7f40349719f2d7679af677e0a3bb6769da7b9c210fa03d7719f1065fb8ea50229d8deaa1c24943d05ca8f"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) 10:28:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) [ 545.004057] loop3: detected capacity change from 0 to 1 [ 545.007759] Bluetooth: Unexpected continuation frame (len 10) [ 545.023806] EXT4-fs: Ignoring removed orlov option [ 545.047719] EXT4-fs (loop3): unable to read superblock 10:28:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}]}) 10:28:56 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r4, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:56 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:28:56 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:28:56 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 10:28:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53", 0x39, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:28:56 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) 10:28:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 559.077298] syz-executor.4: attempt to access beyond end of device [ 559.077298] loop4: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 559.089997] EXT4-fs (loop4): unable to read superblock [ 559.098421] Bluetooth: Unexpected continuation frame (len 10) 10:29:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:29:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:29:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:29:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 10:29:08 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) 10:29:08 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r4, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:29:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) 10:29:08 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 571.180624] Bluetooth: Unexpected continuation frame (len 10) 10:29:08 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 571.195876] syz-executor.4: attempt to access beyond end of device [ 571.195876] loop4: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 571.202490] EXT4-fs: Ignoring removed orlov option [ 571.210367] EXT4-fs (loop4): unable to read superblock [ 571.217452] syz-executor.3: attempt to access beyond end of device [ 571.217452] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 571.225366] EXT4-fs (loop3): unable to read superblock 10:29:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) 10:29:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:29:08 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r4, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:29:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 10:29:08 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:29:08 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b6490872e4327204cb0800be000000000000061a4a4ef2db077faaaaaaaaaa1220403fbd4d501d99aaaaaaaaaa1003099912e7ffff00ffffffffffff1f200d2c060300f9000000000000fca36cfcb50400a3e125a6cb33906c66f9a4677dab2e619eb3227d8d0545853ad0db965fab9a98f3116b4e8826616d7afd07fc0c57f469ae75a5d0b205cb9db972a00f2b2b447d7413fd8451fcecd7f40349719f2d7679af677e0a3bb6769da7b9c210fa03d7719f1065fb8ea50229d8deaa1c24943d05ca8f"], 0x82) 10:29:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 571.350661] Bluetooth: Unexpected continuation frame (len 10) 10:29:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:29:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) [ 571.405391] EXT4-fs: Ignoring removed orlov option [ 571.411199] syz-executor.3: attempt to access beyond end of device [ 571.411199] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 10:29:08 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r4, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 571.426371] EXT4-fs (loop3): unable to read superblock 10:29:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}]}) 10:29:21 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) 10:29:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:29:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, 0x0) 10:29:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:29:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) 10:29:21 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r4, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:29:21 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:29:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 584.515069] EXT4-fs: Ignoring removed orlov option [ 584.523529] syz-executor.7: attempt to access beyond end of device [ 584.523529] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 584.524551] Bluetooth: Unexpected continuation frame (len 10) [ 584.529583] EXT4-fs (loop7): unable to read superblock [ 584.546763] EXT4-fs: Ignoring removed orlov option 10:29:21 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 584.552375] syz-executor.4: attempt to access beyond end of device [ 584.552375] loop4: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 584.554549] syz-executor.3: attempt to access beyond end of device [ 584.554549] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 584.561663] EXT4-fs (loop3): unable to read superblock [ 584.567000] EXT4-fs (loop4): unable to read superblock 10:29:21 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r4, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:29:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}]}) 10:29:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, 0x0) 10:29:21 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) 10:29:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:29:21 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:29:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:29:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:29:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}]}) [ 584.738473] Bluetooth: Unexpected continuation frame (len 10) [ 584.760453] syz-executor.7: attempt to access beyond end of device [ 584.760453] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 584.766975] EXT4-fs (loop7): unable to read superblock [ 584.818588] EXT4-fs: Ignoring removed orlov option [ 584.821269] syz-executor.3: attempt to access beyond end of device [ 584.821269] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 584.827472] EXT4-fs (loop3): unable to read superblock [ 584.837280] EXT4-fs: Ignoring removed orlov option [ 584.837904] syz-executor.4: attempt to access beyond end of device [ 584.837904] loop4: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 584.848005] EXT4-fs (loop4): unable to read superblock 10:29:34 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:29:34 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:29:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:29:34 executing program 5: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) 10:29:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x7ff}], 0x0, 0x0) 10:29:34 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:29:34 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) 10:29:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 597.902117] EXT4-fs: Ignoring removed orlov option [ 597.903013] syz-executor.3: attempt to access beyond end of device [ 597.903013] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 597.905742] syz-executor.7: attempt to access beyond end of device [ 597.905742] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 597.908742] EXT4-fs (loop3): unable to read superblock [ 597.909180] EXT4-fs (loop7): unable to read superblock [ 597.926286] Bluetooth: Unexpected continuation frame (len 10) 10:29:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:29:35 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b6490872e4327204cb0800be000000000000061a4a4ef2db077faaaaaaaaaa1220403fbd4d501d99aaaaaaaaaa1003099912e7ffff00ffffffffffff1f200d2c060300f9000000000000fca36cfcb50400a3e125a6cb33906c66f9a4677dab2e619eb3227d8d0545853ad0db965fab9a98f3116b4e8826616d7afd07fc0c57f469ae75a5d0b205cb9db972a00f2b2b447d7413fd8451fcecd7f40349719f2d7679af677e0a3bb6769da7b9c210fa03d7719f1065fb8ea50229d8deaa1c24943d05ca8f"], 0x82) [ 598.029628] EXT4-fs: Ignoring removed orlov option [ 598.030955] syz-executor.3: attempt to access beyond end of device [ 598.030955] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 598.048387] EXT4-fs (loop3): unable to read superblock 10:29:47 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:29:47 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:29:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:29:47 executing program 5: syz_emit_vhci(0x0, 0x82) 10:29:47 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:29:47 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:29:47 executing program 2: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r0, &(0x7f00000001c0)=""/219, 0xdb) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r1, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) 10:29:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 610.899175] Bluetooth: Unexpected continuation frame (len 10) [ 610.936462] loop7: detected capacity change from 0 to 1 [ 610.942268] EXT4-fs: Ignoring removed orlov option [ 610.946036] EXT4-fs: Ignoring removed orlov option [ 610.950631] syz-executor.3: attempt to access beyond end of device [ 610.950631] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 610.950644] EXT4-fs (loop7): unable to read superblock [ 610.957216] EXT4-fs (loop3): unable to read superblock 10:29:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:29:48 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:29:48 executing program 5: syz_emit_vhci(0x0, 0x82) 10:29:48 executing program 7: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x8) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x5d, 0x62, 0x1a, 0x0, 0x2, 0x1c80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x6, 0x7fff}, 0x200, 0x2, 0x5, 0x3, 0x4, 0x6, 0x1, 0x0, 0xca3, 0x0, 0x6}, r4, 0x5, r3, 0x5) [ 611.089357] EXT4-fs: Ignoring removed orlov option [ 611.094660] syz-executor.3: attempt to access beyond end of device [ 611.094660] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 10:29:48 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 611.105880] EXT4-fs (loop3): unable to read superblock 10:29:48 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 611.156725] Bluetooth: Unexpected continuation frame (len 10) 10:29:48 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:29:48 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:29:48 executing program 5: syz_emit_vhci(0x0, 0x82) [ 611.310852] EXT4-fs: Ignoring removed orlov option [ 611.318560] syz-executor.3: attempt to access beyond end of device [ 611.318560] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 10:29:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 611.335523] EXT4-fs (loop3): unable to read superblock 10:30:00 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r0}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:30:00 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:00 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r4, 0x540a, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r6, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:00 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[], 0x82) 10:30:00 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:30:00 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:00 executing program 7: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x8) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x5d, 0x62, 0x1a, 0x0, 0x2, 0x1c80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x6, 0x7fff}, 0x200, 0x2, 0x5, 0x3, 0x4, 0x6, 0x1, 0x0, 0xca3, 0x0, 0x6}, r4, 0x5, r3, 0x5) [ 623.807444] Bluetooth: Unexpected continuation frame (len 10) [ 623.849816] EXT4-fs: Ignoring removed orlov option [ 623.851680] syz-executor.3: attempt to access beyond end of device [ 623.851680] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 623.855394] EXT4-fs (loop3): unable to read superblock 10:30:00 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[], 0x82) 10:30:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r0}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:30:00 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:30:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:30:01 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r2, 0x540a, 0x2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:01 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[], 0x82) [ 624.032355] EXT4-fs: Ignoring removed orlov option 10:30:01 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 624.043672] syz-executor.3: attempt to access beyond end of device [ 624.043672] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 624.049305] EXT4-fs (loop3): unable to read superblock 10:30:01 executing program 4: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x8) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x5d, 0x62, 0x1a, 0x0, 0x2, 0x1c80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x6, 0x7fff}, 0x200, 0x2, 0x5, 0x3, 0x4, 0x6, 0x1, 0x0, 0xca3, 0x0, 0x6}, r4, 0x5, r3, 0x5) r5 = syz_open_dev$vcsn(&(0x7f0000000300), 0x7f3, 0x202) ppoll(&(0x7f0000000340)=[{r1, 0x558}, {r5, 0x540c}, {r0, 0x40}], 0x3, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)={[0x3]}, 0x8) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x7, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1c62}, 0x1c) 10:30:01 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB], 0x82) [ 624.179990] Bluetooth: Unexpected continuation frame (len 10) 10:30:15 executing program 4: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x8) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x5d, 0x62, 0x1a, 0x0, 0x2, 0x1c80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x6, 0x7fff}, 0x200, 0x2, 0x5, 0x3, 0x4, 0x6, 0x1, 0x0, 0xca3, 0x0, 0x6}, r4, 0x5, r3, 0x5) r5 = syz_open_dev$vcsn(&(0x7f0000000300), 0x7f3, 0x202) ppoll(&(0x7f0000000340)=[{r1, 0x558}, {r5, 0x540c}, {r0, 0x40}], 0x3, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)={[0x3]}, 0x8) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x7, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1c62}, 0x1c) 10:30:15 executing program 7: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x8) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x5d, 0x62, 0x1a, 0x0, 0x2, 0x1c80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x6, 0x7fff}, 0x200, 0x2, 0x5, 0x3, 0x4, 0x6, 0x1, 0x0, 0xca3, 0x0, 0x6}, r4, 0x5, r3, 0x5) r5 = syz_open_dev$vcsn(&(0x7f0000000300), 0x7f3, 0x202) ppoll(&(0x7f0000000340)=[{r1, 0x558}, {r5, 0x540c}, {r0, 0x40}], 0x3, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)={[0x3]}, 0x8) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x7, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1c62}, 0x1c) 10:30:15 executing program 2: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="02c9100a0006000500130002000900888cf9577f82571add1c937e943914751de62131a009bd3530d142653ffd0bdd5966f851016094c30566d4b1605eed966eec7208c55c6a611d214fa8f1fa107998064649c88b824e68e816aaa136a5037291909a7aff2717cb600000c924030055cf8dff61f268b5be2bb165089b6105acfb8f33a446"], 0xf) syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x82) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000004}, 0x40000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r1, &(0x7f00000001c0)=""/219, 0xdb) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) syz_emit_vhci(&(0x7f00000004c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r2, 0x300, 0x70bd25, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x20000800) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r4 = creat(&(0x7f0000000480)='./file0\x00', 0x8) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x5d, 0x62, 0x1a, 0x0, 0x2, 0x1c80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x6, 0x7fff}, 0x200, 0x2, 0x5, 0x3, 0x4, 0x6, 0x1, 0x0, 0xca3, 0x0, 0x6}, r4, 0x5, r3, 0x5) r5 = syz_open_dev$vcsn(&(0x7f0000000300), 0x7f3, 0x202) ppoll(&(0x7f0000000340)=[{r1, 0x558}, {r5, 0x540c}, {r0, 0x40}], 0x3, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)={[0x3]}, 0x8) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x7, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1c62}, 0x1c) 10:30:15 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:30:15 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r2, 0x540a, 0x2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r0}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:30:15 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB], 0x82) [ 638.301268] Bluetooth: Unexpected continuation frame (len 10) [ 638.322660] Bluetooth: Unexpected continuation frame (len 10) [ 638.329553] EXT4-fs: Ignoring removed orlov option [ 638.339724] syz-executor.3: attempt to access beyond end of device [ 638.339724] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 10:30:15 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB], 0x82) [ 638.356645] EXT4-fs (loop3): unable to read superblock [ 638.358025] Bluetooth: Unexpected continuation frame (len 10) 10:30:15 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b6490872e4327204cb0800be000000000000061a4a4ef2db077faaaaaaaaaa1220403fbd4d501d99aaaaaaaaaa1003099912e7ffff00ffffffffffff1f200d2c0603"], 0x82) 10:30:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:30:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(0x0, &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 638.481233] EXT4-fs: Ignoring removed orlov option [ 638.483685] syz-executor.3: attempt to access beyond end of device [ 638.483685] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 638.486452] EXT4-fs (loop3): unable to read superblock 10:30:15 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r2, 0x540a, 0x2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:15 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents(r5, &(0x7f00000001c0)=""/219, 0xdb) ioctl$TCXONC(r5, 0x540a, 0x2) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r7, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:15 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB], 0x82) 10:30:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 1) 10:30:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:30:30 executing program 6: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 1) 10:30:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:30:30 executing program 0: ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:30 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB], 0x82) 10:30:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(0x0, &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 652.989467] FAULT_INJECTION: forcing a failure. [ 652.989467] name failslab, interval 1, probability 0, space 0, times 1 [ 652.990308] CPU: 0 PID: 6196 Comm: syz-executor.7 Not tainted 6.5.0-rc4-next-20230731 #1 [ 652.990836] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 652.991364] Call Trace: [ 652.991539] [ 652.991696] dump_stack_lvl+0xc1/0xf0 [ 652.991967] should_fail_ex+0x4b4/0x5b0 [ 652.992247] ? __do_sys_memfd_create+0x17d/0xa20 [ 652.992563] should_failslab+0x9/0x20 [ 652.992824] __kmem_cache_alloc_node+0x66/0x310 [ 652.993147] ? __do_sys_memfd_create+0x17d/0xa20 [ 652.993466] ? __do_sys_memfd_create+0x17d/0xa20 [ 652.993785] __kmalloc+0x4d/0x160 [ 652.994028] __do_sys_memfd_create+0x17d/0xa20 [ 652.994357] ? fput+0x2f/0x1a0 [ 652.994594] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 652.994933] ? __pfx_ksys_write+0x10/0x10 [ 652.995217] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 652.995576] do_syscall_64+0x3f/0x90 [ 652.995842] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 652.996188] RIP: 0033:0x7f0da2a8db19 [ 652.996435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 652.997595] RSP: 002b:00007f0da0002f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 652.998082] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f0da2a8db19 [ 652.998436] FAULT_INJECTION: forcing a failure. [ 652.998436] name failslab, interval 1, probability 0, space 0, times 1 [ 652.998549] RDX: 00007f0da0003000 RSI: 0000000000000000 RDI: 00007f0da2ae70fb [ 652.998561] RBP: 0000000000000000 R08: 00007f0da0002ff8 R09: ffffffffffffffff [ 653.000987] R10: 00007f0da0002ffc R11: 0000000000000246 R12: 0000000020000040 [ 653.001465] R13: 0000000020000140 R14: 0000000000000000 R15: 00000000200018c0 [ 653.001978] [ 653.002154] CPU: 1 PID: 6199 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 653.003320] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 653.004476] Call Trace: [ 653.004852] [ 653.005187] dump_stack_lvl+0xc1/0xf0 [ 653.005782] should_fail_ex+0x4b4/0x5b0 [ 653.006388] ? __do_sys_memfd_create+0x17d/0xa20 [ 653.007045] should_failslab+0x9/0x20 [ 653.007622] __kmem_cache_alloc_node+0x66/0x310 [ 653.008331] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 653.009117] ? __do_sys_memfd_create+0x17d/0xa20 [ 653.009827] ? __do_sys_memfd_create+0x17d/0xa20 [ 653.010467] __kmalloc+0x4d/0x160 [ 653.010993] __do_sys_memfd_create+0x17d/0xa20 [ 653.011668] ? fput+0x2f/0x1a0 [ 653.012182] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 653.012919] ? ksys_write+0x19e/0x250 [ 653.013513] ? __pfx_ksys_write+0x10/0x10 [ 653.014137] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 653.014887] do_syscall_64+0x3f/0x90 [ 653.015450] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 653.016181] RIP: 0033:0x7ffac4fc2b19 [ 653.016676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 653.019132] RSP: 002b:00007ffac2537f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 653.020191] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ffac4fc2b19 [ 653.021182] RDX: 0000000000000ffe RSI: 0000000000000000 RDI: 00007ffac501c0fb [ 653.022204] RBP: 0000000000000002 R08: 00000000000007ff R09: ffffffffffffffff [ 653.023201] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 653.024206] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012800 [ 653.025219] [ 653.027581] EXT4-fs: Ignoring removed orlov option [ 653.037854] syz-executor.3: attempt to access beyond end of device [ 653.037854] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 653.043197] EXT4-fs (loop3): unable to read superblock 10:30:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(0x0, &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:30:30 executing program 6: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 2) 10:30:30 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB], 0x82) [ 653.133472] syz-executor.7: attempt to access beyond end of device [ 653.133472] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 653.138176] EXT4-fs (loop7): unable to read superblock 10:30:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:30:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 1) 10:30:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 2) [ 653.225966] EXT4-fs: Ignoring removed orlov option [ 653.234238] syz-executor.3: attempt to access beyond end of device [ 653.234238] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 653.242213] EXT4-fs (loop3): unable to read superblock 10:30:30 executing program 0: ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 653.280376] FAULT_INJECTION: forcing a failure. [ 653.280376] name failslab, interval 1, probability 0, space 0, times 0 [ 653.282009] CPU: 0 PID: 6217 Comm: syz-executor.2 Not tainted 6.5.0-rc4-next-20230731 #1 [ 653.283166] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 653.284261] Call Trace: [ 653.284584] [ 653.284911] dump_stack_lvl+0xc1/0xf0 [ 653.285500] should_fail_ex+0x4b4/0x5b0 [ 653.286074] ? __do_sys_memfd_create+0x17d/0xa20 [ 653.286802] should_failslab+0x9/0x20 [ 653.287345] __kmem_cache_alloc_node+0x66/0x310 [ 653.288045] ? __do_sys_memfd_create+0x17d/0xa20 [ 653.288712] ? __do_sys_memfd_create+0x17d/0xa20 [ 653.289328] __kmalloc+0x4d/0x160 [ 653.289794] __do_sys_memfd_create+0x17d/0xa20 [ 653.290485] ? fput+0x2f/0x1a0 [ 653.290973] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 653.291700] ? __pfx_ksys_write+0x10/0x10 [ 653.292293] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 653.293025] do_syscall_64+0x3f/0x90 [ 653.293517] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 653.294179] RIP: 0033:0x7f1977c7ab19 [ 653.294638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 653.296852] RSP: 002b:00007f19751eff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 653.297798] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f1977c7ab19 [ 653.298699] RDX: 00007f19751f0000 RSI: 0000000000000000 RDI: 00007f1977cd40fb [ 653.299586] RBP: 0000000000000000 R08: 00007f19751efff8 R09: ffffffffffffffff [ 653.300491] R10: 00007f19751efffc R11: 0000000000000246 R12: 0000000020000040 [ 653.301375] R13: 0000000020000140 R14: 0000000000000000 R15: 00000000200018c0 [ 653.302284] [ 653.309609] loop4: detected capacity change from 0 to 512 [ 653.319230] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 653.320666] EXT4-fs (loop4): group descriptors corrupted! 10:30:43 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b649"], 0x82) 10:30:43 executing program 0: ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 2) 10:30:43 executing program 6: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:30:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', 0x0, &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:30:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 3) 10:30:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 3) [ 666.810338] FAULT_INJECTION: forcing a failure. [ 666.810338] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 666.811972] CPU: 1 PID: 6263 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 666.812963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 666.813962] Call Trace: [ 666.814301] [ 666.814605] dump_stack_lvl+0xc1/0xf0 [ 666.815119] should_fail_ex+0x4b4/0x5b0 [ 666.815646] _copy_from_user+0x30/0xf0 [ 666.816172] __do_sys_memfd_create+0x2ca/0xa20 [ 666.816760] ? fput+0x2f/0x1a0 [ 666.817189] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 666.817825] ? ksys_write+0x19e/0x250 [ 666.818330] ? __pfx_ksys_write+0x10/0x10 [ 666.818868] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 666.819533] do_syscall_64+0x3f/0x90 [ 666.820038] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 666.820680] RIP: 0033:0x7ffac4fc2b19 [ 666.821150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 666.823347] RSP: 002b:00007ffac2537f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 666.824276] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ffac4fc2b19 [ 666.825147] RDX: 0000000000000ffe RSI: 0000000000000000 RDI: 00007ffac501c0fb [ 666.826028] RBP: 0000000000000002 R08: 00000000000007ff R09: ffffffffffffffff [ 666.826913] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 666.827794] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012800 [ 666.828117] EXT4-fs: Ignoring removed orlov option [ 666.828673] [ 666.838946] syz-executor.3: attempt to access beyond end of device [ 666.838946] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 666.844671] FAULT_INJECTION: forcing a failure. [ 666.844671] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 666.846247] CPU: 0 PID: 6268 Comm: syz-executor.7 Not tainted 6.5.0-rc4-next-20230731 #1 [ 666.847350] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 666.848436] Call Trace: [ 666.848798] [ 666.849120] dump_stack_lvl+0xc1/0xf0 [ 666.849684] should_fail_ex+0x4b4/0x5b0 [ 666.850263] _copy_from_user+0x30/0xf0 [ 666.850878] __do_sys_memfd_create+0x2ca/0xa20 [ 666.851528] ? fput+0x2f/0x1a0 [ 666.852012] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 666.852750] ? __pfx_ksys_write+0x10/0x10 [ 666.853350] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 666.854100] do_syscall_64+0x3f/0x90 [ 666.854691] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 666.855415] RIP: 0033:0x7f0da2a8db19 [ 666.855942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 666.858405] RSP: 002b:00007f0da0002f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 666.859459] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f0da2a8db19 [ 666.860440] RDX: 00007f0da0003000 RSI: 0000000000000000 RDI: 00007f0da2ae70fb [ 666.861430] RBP: 0000000000000000 R08: 00007f0da0002ff8 R09: ffffffffffffffff [ 666.862442] R10: 00007f0da0002ffc R11: 0000000000000246 R12: 0000000020000040 [ 666.863427] R13: 0000000020000140 R14: 0000000000000000 R15: 00000000200018c0 [ 666.864437] [ 666.870204] EXT4-fs (loop3): unable to read superblock 10:30:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 3) 10:30:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 4) 10:30:44 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b649"], 0x82) [ 666.992001] FAULT_INJECTION: forcing a failure. [ 666.992001] name failslab, interval 1, probability 0, space 0, times 0 [ 666.993470] FAULT_INJECTION: forcing a failure. [ 666.993470] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 666.993487] CPU: 1 PID: 6273 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 666.993521] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 666.996842] Call Trace: [ 666.997163] [ 666.997458] dump_stack_lvl+0xc1/0xf0 [ 666.997975] should_fail_ex+0x4b4/0x5b0 [ 666.998510] should_failslab+0x9/0x20 [ 666.998993] kmem_cache_alloc_lru+0x7a/0x680 [ 666.999553] ? find_held_lock+0x2c/0x110 [ 667.000083] ? shmem_alloc_inode+0x27/0x50 [ 667.000624] ? alloc_fd+0x2eb/0x760 [ 667.001109] ? shmem_alloc_inode+0x27/0x50 [ 667.001651] shmem_alloc_inode+0x27/0x50 [ 667.002163] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 667.002765] alloc_inode+0x63/0x240 [ 667.003236] new_inode+0x25/0x1f0 [ 667.003691] __shmem_get_inode+0x181/0xe20 [ 667.004228] ? do_raw_spin_unlock+0x53/0x220 [ 667.004810] __shmem_file_setup+0x171/0x310 [ 667.005363] __do_sys_memfd_create+0x385/0xa20 [ 667.005927] ? fput+0x2f/0x1a0 [ 667.006377] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 667.007008] ? ksys_write+0x19e/0x250 [ 667.007496] ? __pfx_ksys_write+0x10/0x10 [ 667.008027] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 667.008687] do_syscall_64+0x3f/0x90 [ 667.009178] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 667.009820] RIP: 0033:0x7ffac4fc2b19 [ 667.010277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 667.012461] RSP: 002b:00007ffac2537f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 667.013383] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ffac4fc2b19 [ 667.014241] RDX: 0000000000000ffe RSI: 0000000000000000 RDI: 00007ffac501c0fb [ 667.015119] RBP: 0000000000000002 R08: 00000000000007ff R09: ffffffffffffffff [ 667.015983] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 667.016838] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012800 [ 667.017714] [ 667.018011] CPU: 0 PID: 6272 Comm: syz-executor.2 Not tainted 6.5.0-rc4-next-20230731 #1 [ 667.019017] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 667.019998] Call Trace: [ 667.020317] [ 667.020605] dump_stack_lvl+0xc1/0xf0 [ 667.021111] should_fail_ex+0x4b4/0x5b0 [ 667.021626] _copy_from_user+0x30/0xf0 [ 667.022135] __do_sys_memfd_create+0x2ca/0xa20 [ 667.022712] ? fput+0x2f/0x1a0 [ 667.023148] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 667.023764] ? __pfx_ksys_write+0x10/0x10 [ 667.024291] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 667.024955] do_syscall_64+0x3f/0x90 [ 667.025457] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 667.026181] RIP: 0033:0x7f1977c7ab19 [ 667.026724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 667.028997] RSP: 002b:00007f19751eff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 667.029903] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f1977c7ab19 [ 667.030759] RDX: 00007f19751f0000 RSI: 0000000000000000 RDI: 00007f1977cd40fb [ 667.031614] RBP: 0000000000000000 R08: 00007f19751efff8 R09: ffffffffffffffff [ 667.032466] R10: 00007f19751efffc R11: 0000000000000246 R12: 0000000020000040 [ 667.033311] R13: 0000000020000140 R14: 0000000000000000 R15: 00000000200018c0 [ 667.034183] 10:30:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', 0x0, &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:30:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:30:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 4) 10:30:44 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:44 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b649"], 0x82) [ 667.202050] FAULT_INJECTION: forcing a failure. [ 667.202050] name failslab, interval 1, probability 0, space 0, times 0 [ 667.203509] CPU: 1 PID: 6284 Comm: syz-executor.7 Not tainted 6.5.0-rc4-next-20230731 #1 [ 667.204519] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 667.205514] Call Trace: [ 667.205855] [ 667.206149] dump_stack_lvl+0xc1/0xf0 [ 667.206665] should_fail_ex+0x4b4/0x5b0 [ 667.207184] should_failslab+0x9/0x20 [ 667.207671] kmem_cache_alloc_lru+0x7a/0x680 [ 667.208232] ? find_held_lock+0x2c/0x110 10:30:44 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 4) [ 667.208772] ? shmem_alloc_inode+0x27/0x50 [ 667.209494] ? alloc_fd+0x2eb/0x760 [ 667.209984] ? shmem_alloc_inode+0x27/0x50 [ 667.210550] shmem_alloc_inode+0x27/0x50 [ 667.211078] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 667.211699] alloc_inode+0x63/0x240 [ 667.212163] new_inode+0x25/0x1f0 [ 667.212625] __shmem_get_inode+0x181/0xe20 [ 667.213155] ? do_raw_spin_unlock+0x53/0x220 [ 667.213760] __shmem_file_setup+0x171/0x310 [ 667.214325] __do_sys_memfd_create+0x385/0xa20 [ 667.214932] ? fput+0x2f/0x1a0 [ 667.215361] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 667.216017] ? __pfx_ksys_write+0x10/0x10 [ 667.216551] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 667.217241] do_syscall_64+0x3f/0x90 [ 667.217730] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 667.218423] RIP: 0033:0x7f0da2a8db19 [ 667.218887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 667.221114] RSP: 002b:00007f0da0002f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 667.222048] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f0da2a8db19 [ 667.222960] RDX: 00007f0da0003000 RSI: 0000000000000000 RDI: 00007f0da2ae70fb [ 667.223849] RBP: 0000000000000000 R08: 00007f0da0002ff8 R09: ffffffffffffffff [ 667.224752] R10: 00007f0da0002ffc R11: 0000000000000246 R12: 0000000020000040 [ 667.225641] R13: 0000000020000140 R14: 0000000000000000 R15: 00000000200018c0 [ 667.226563] 10:30:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 5) [ 667.340880] FAULT_INJECTION: forcing a failure. [ 667.340880] name failslab, interval 1, probability 0, space 0, times 0 [ 667.342498] CPU: 1 PID: 6290 Comm: syz-executor.2 Not tainted 6.5.0-rc4-next-20230731 #1 [ 667.343526] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 667.344546] Call Trace: [ 667.344883] [ 667.345184] dump_stack_lvl+0xc1/0xf0 [ 667.345706] should_fail_ex+0x4b4/0x5b0 [ 667.346247] should_failslab+0x9/0x20 [ 667.346783] kmem_cache_alloc_lru+0x7a/0x680 [ 667.347368] ? find_held_lock+0x2c/0x110 [ 667.347933] ? shmem_alloc_inode+0x27/0x50 [ 667.348491] ? alloc_fd+0x2eb/0x760 [ 667.348990] ? shmem_alloc_inode+0x27/0x50 [ 667.349545] shmem_alloc_inode+0x27/0x50 [ 667.350080] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 667.350705] alloc_inode+0x63/0x240 [ 667.351189] new_inode+0x25/0x1f0 [ 667.351655] __shmem_get_inode+0x181/0xe20 [ 667.352212] ? do_raw_spin_unlock+0x53/0x220 [ 667.352807] __shmem_file_setup+0x171/0x310 [ 667.353384] __do_sys_memfd_create+0x385/0xa20 [ 667.353977] ? fput+0x2f/0x1a0 [ 667.354446] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 667.355091] ? ksys_write+0x19e/0x250 [ 667.355593] ? __pfx_ksys_write+0x10/0x10 [ 667.356148] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 667.356829] do_syscall_64+0x3f/0x90 [ 667.357337] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 667.358001] RIP: 0033:0x7f1977c7ab19 [ 667.358495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 667.360705] RSP: 002b:00007f19751eff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 667.361665] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f1977c7ab19 [ 667.362573] RDX: 00007f19751f0000 RSI: 0000000000000000 RDI: 00007f1977cd40fb [ 667.363463] RBP: 0000000000000000 R08: 00007f19751efff8 R09: ffffffffffffffff [ 667.364347] R10: 00007f19751efffc R11: 0000000000000246 R12: 0000000020000040 [ 667.365235] R13: 0000000020000140 R14: 0000000000000000 R15: 00000000200018c0 [ 667.366153] 10:30:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 667.410548] loop4: detected capacity change from 0 to 512 [ 667.427506] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 667.428804] EXT4-fs (loop4): group descriptors corrupted! 10:30:57 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 6) 10:30:57 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:30:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 5) 10:30:57 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b6490872e4327204cb0800be000000000000061a4a4ef2db077faaaaaaaaaa122040"], 0x82) 10:30:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 5) 10:30:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:30:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', 0x0, &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 680.118058] FAULT_INJECTION: forcing a failure. [ 680.118058] name failslab, interval 1, probability 0, space 0, times 0 [ 680.119646] CPU: 1 PID: 6338 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 680.120740] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 680.121844] Call Trace: [ 680.122211] [ 680.122558] dump_stack_lvl+0xc1/0xf0 [ 680.123124] should_fail_ex+0x4b4/0x5b0 [ 680.123697] ? security_inode_alloc+0x38/0x160 [ 680.124355] should_failslab+0x9/0x20 [ 680.124896] kmem_cache_alloc+0x61/0x390 [ 680.125473] security_inode_alloc+0x38/0x160 [ 680.126111] inode_init_always+0xbb2/0xea0 [ 680.126737] alloc_inode+0x84/0x240 [ 680.127261] new_inode+0x25/0x1f0 [ 680.127767] __shmem_get_inode+0x181/0xe20 [ 680.128352] ? do_raw_spin_unlock+0x53/0x220 [ 680.128998] __shmem_file_setup+0x171/0x310 [ 680.129622] __do_sys_memfd_create+0x385/0xa20 [ 680.130259] ? fput+0x2f/0x1a0 [ 680.130763] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 680.131477] ? ksys_write+0x19e/0x250 [ 680.132025] ? __pfx_ksys_write+0x10/0x10 [ 680.132610] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 680.133342] do_syscall_64+0x3f/0x90 [ 680.133885] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 680.134581] RIP: 0033:0x7ffac4fc2b19 [ 680.135093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 680.137499] RSP: 002b:00007ffac2537f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 680.138527] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ffac4fc2b19 [ 680.139480] RDX: 0000000000000ffe RSI: 0000000000000000 RDI: 00007ffac501c0fb [ 680.140439] RBP: 0000000000000002 R08: 00000000000007ff R09: ffffffffffffffff [ 680.141393] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 680.142333] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012800 [ 680.143312] 10:30:57 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b6490872e4327204cb0800be000000000000061a4a4ef2db077faaaaaaaaaa122040"], 0x82) [ 680.200913] syz-executor.7: attempt to access beyond end of device [ 680.200913] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 680.202712] EXT4-fs (loop7): unable to read superblock 10:31:18 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:31:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:31:18 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:31:18 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae09030008000000ddff00f9d4377463030008ffffffffffff4075c7724f69ff5b337693b649"], 0x82) 10:31:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), 0x0, 0x0, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:31:18 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 6) 10:31:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 7) 10:31:18 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 6) [ 701.252280] loop4: detected capacity change from 0 to 512 [ 701.264831] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 701.265777] EXT4-fs (loop4): group descriptors corrupted! [ 701.270724] FAULT_INJECTION: forcing a failure. [ 701.270724] name failslab, interval 1, probability 0, space 0, times 0 [ 701.271730] CPU: 0 PID: 6378 Comm: syz-executor.7 Not tainted 6.5.0-rc4-next-20230731 #1 [ 701.272433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.273121] Call Trace: [ 701.273351] [ 701.273558] dump_stack_lvl+0xc1/0xf0 [ 701.273919] should_fail_ex+0x4b4/0x5b0 [ 701.274290] ? security_inode_alloc+0x38/0x160 [ 701.274708] should_failslab+0x9/0x20 [ 701.275062] kmem_cache_alloc+0x61/0x390 [ 701.275446] security_inode_alloc+0x38/0x160 [ 701.275852] inode_init_always+0xbb2/0xea0 [ 701.276246] alloc_inode+0x84/0x240 [ 701.276580] new_inode+0x25/0x1f0 [ 701.276903] __shmem_get_inode+0x181/0xe20 [ 701.277291] ? do_raw_spin_unlock+0x53/0x220 [ 701.277705] __shmem_file_setup+0x171/0x310 [ 701.278102] __do_sys_memfd_create+0x385/0xa20 [ 701.278518] ? fput+0x2f/0x1a0 [ 701.278830] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 701.279289] ? __pfx_ksys_write+0x10/0x10 [ 701.279666] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 701.280140] do_syscall_64+0x3f/0x90 [ 701.280493] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 701.280945] RIP: 0033:0x7f0da2a8db19 [ 701.281299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.282894] RSP: 002b:00007f0da0002f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 701.283550] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f0da2a8db19 [ 701.284169] RDX: 00007f0da0003000 RSI: 0000000000000000 RDI: 00007f0da2ae70fb [ 701.284784] RBP: 0000000000000000 R08: 00007f0da0002ff8 R09: ffffffffffffffff [ 701.285397] R10: 00007f0da0002ffc R11: 0000000000000246 R12: 0000000020000040 [ 701.286011] R13: 0000000020000140 R14: 0000000000000000 R15: 00000000200018c0 [ 701.286273] FAULT_INJECTION: forcing a failure. [ 701.286273] name failslab, interval 1, probability 0, space 0, times 0 [ 701.286629] [ 701.288366] CPU: 1 PID: 6381 Comm: syz-executor.2 Not tainted 6.5.0-rc4-next-20230731 #1 [ 701.289543] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.290752] Call Trace: [ 701.291168] [ 701.291512] dump_stack_lvl+0xc1/0xf0 [ 701.292103] should_fail_ex+0x4b4/0x5b0 [ 701.292723] ? security_inode_alloc+0x38/0x160 [ 701.293455] should_failslab+0x9/0x20 [ 701.294036] kmem_cache_alloc+0x61/0x390 [ 701.294698] security_inode_alloc+0x38/0x160 [ 701.295388] inode_init_always+0xbb2/0xea0 [ 701.296052] alloc_inode+0x84/0x240 [ 701.296606] new_inode+0x25/0x1f0 [ 701.297129] __shmem_get_inode+0x181/0xe20 [ 701.297766] ? do_raw_spin_unlock+0x53/0x220 [ 701.298479] __shmem_file_setup+0x171/0x310 [ 701.299163] __do_sys_memfd_create+0x385/0xa20 [ 701.299829] ? fput+0x2f/0x1a0 [ 701.300341] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 701.301077] ? ksys_write+0x19e/0x250 [ 701.301653] ? __pfx_ksys_write+0x10/0x10 [ 701.302274] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 701.303060] do_syscall_64+0x3f/0x90 [ 701.303634] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 701.304390] RIP: 0033:0x7f1977c7ab19 [ 701.304947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.307482] RSP: 002b:00007f19751eff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 701.308560] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f1977c7ab19 [ 701.309570] RDX: 00007f19751f0000 RSI: 0000000000000000 RDI: 00007f1977cd40fb [ 701.310598] RBP: 0000000000000000 R08: 00007f19751efff8 R09: ffffffffffffffff [ 701.311648] R10: 00007f19751efffc R11: 0000000000000246 R12: 0000000020000040 [ 701.312708] R13: 0000000020000140 R14: 0000000000000000 R15: 00000000200018c0 [ 701.313756] 10:31:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), 0x0, 0x0, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:31:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 8) 10:31:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:31:18 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae0903000800"], 0x82) 10:31:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:31:18 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 7) [ 701.468943] FAULT_INJECTION: forcing a failure. [ 701.468943] name failslab, interval 1, probability 0, space 0, times 0 [ 701.470605] CPU: 1 PID: 6388 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 701.471678] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.472840] Call Trace: [ 701.473199] [ 701.473543] dump_stack_lvl+0xc1/0xf0 [ 701.474097] should_fail_ex+0x4b4/0x5b0 [ 701.474709] should_failslab+0x9/0x20 [ 701.475255] kmem_cache_alloc_lru+0x7a/0x680 [ 701.475921] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 701.476648] ? __d_alloc+0x31/0x9c0 [ 701.477212] ? __d_alloc+0x31/0x9c0 [ 701.477729] __d_alloc+0x31/0x9c0 [ 701.478264] ? get_random_u32+0x3b2/0x670 [ 701.478861] d_alloc_pseudo+0x1d/0x70 [ 701.479451] alloc_file_pseudo+0xd2/0x260 [ 701.480043] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 701.480757] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 701.481521] ? __shmem_get_inode+0x6c4/0xe20 [ 701.482180] ? do_raw_spin_unlock+0x53/0x220 [ 701.482850] __shmem_file_setup+0x215/0x310 [ 701.483503] __do_sys_memfd_create+0x385/0xa20 [ 701.484169] ? fput+0x2f/0x1a0 [ 701.484672] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 701.485403] ? ksys_write+0x19e/0x250 [ 701.485978] ? __pfx_ksys_write+0x10/0x10 [ 701.486598] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 701.487395] do_syscall_64+0x3f/0x90 [ 701.487966] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 701.488720] RIP: 0033:0x7ffac4fc2b19 [ 701.489268] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.491807] RSP: 002b:00007ffac2537f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 10:31:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), 0x0, 0x0, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 701.492811] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ffac4fc2b19 [ 701.494002] RDX: 0000000000000ffe RSI: 0000000000000000 RDI: 00007ffac501c0fb [ 701.494989] RBP: 0000000000000002 R08: 00000000000007ff R09: ffffffffffffffff [ 701.495942] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 701.496893] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012800 [ 701.497867] 10:31:18 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:31:18 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc06000900000000000018e9e3ae0903000800"], 0x82) 10:31:18 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 7) 10:31:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 9) [ 701.624313] syz-executor.7: attempt to access beyond end of device [ 701.624313] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 701.635613] EXT4-fs (loop7): unable to read superblock 10:31:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:31:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:31:18 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04"], 0x82) [ 701.699433] loop4: detected capacity change from 0 to 512 10:31:18 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 8) 10:31:18 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 8) [ 701.750520] Bluetooth: hci4: Received unexpected HCI Event 0x00 [ 701.759582] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 701.761048] EXT4-fs (loop4): group descriptors corrupted! 10:31:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) [ 701.766695] FAULT_INJECTION: forcing a failure. [ 701.766695] name failslab, interval 1, probability 0, space 0, times 0 [ 701.767665] CPU: 0 PID: 6415 Comm: syz-executor.2 Not tainted 6.5.0-rc4-next-20230731 #1 [ 701.768312] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.768965] Call Trace: [ 701.769180] [ 701.769372] dump_stack_lvl+0xc1/0xf0 [ 701.769703] should_fail_ex+0x4b4/0x5b0 [ 701.770071] should_failslab+0x9/0x20 [ 701.770402] kmem_cache_alloc_lru+0x7a/0x680 [ 701.770791] ? __d_alloc+0x31/0x9c0 [ 701.771114] ? __d_alloc+0x31/0x9c0 [ 701.771424] __d_alloc+0x31/0x9c0 [ 701.771717] ? get_random_u32+0x3b2/0x670 [ 701.772058] d_alloc_pseudo+0x1d/0x70 [ 701.772393] alloc_file_pseudo+0xd2/0x260 [ 701.772742] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 701.773141] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 701.773594] ? __shmem_get_inode+0x6c4/0xe20 [ 701.773974] ? do_raw_spin_unlock+0x53/0x220 [ 701.774351] __shmem_file_setup+0x215/0x310 [ 701.774706] __do_sys_memfd_create+0x385/0xa20 [ 701.775103] ? fput+0x2f/0x1a0 [ 701.775390] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 701.775802] ? __pfx_ksys_write+0x10/0x10 [ 701.776184] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 701.776615] do_syscall_64+0x3f/0x90 [ 701.776959] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 701.777434] RIP: 0033:0x7f1977c7ab19 [ 701.777735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.779243] RSP: 002b:00007f19751eff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 701.779855] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f1977c7ab19 [ 701.780428] RDX: 00007f19751f0000 RSI: 0000000000000000 RDI: 00007f1977cd40fb [ 701.780990] RBP: 0000000000000000 R08: 00007f19751efff8 R09: ffffffffffffffff [ 701.781547] R10: 00007f19751efffc R11: 0000000000000246 R12: 0000000020000040 [ 701.782120] R13: 0000000020000140 R14: 0000000000000000 R15: 00000000200018c0 [ 701.782702] 10:31:18 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 701.848039] FAULT_INJECTION: forcing a failure. [ 701.848039] name failslab, interval 1, probability 0, space 0, times 0 [ 701.849489] CPU: 1 PID: 6418 Comm: syz-executor.7 Not tainted 6.5.0-rc4-next-20230731 #1 [ 701.850428] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.851368] Call Trace: [ 701.851680] [ 701.851955] dump_stack_lvl+0xc1/0xf0 [ 701.852436] should_fail_ex+0x4b4/0x5b0 [ 701.852927] should_failslab+0x9/0x20 [ 701.853387] kmem_cache_alloc_lru+0x7a/0x680 [ 701.853921] ? __d_alloc+0x31/0x9c0 [ 701.854376] ? __d_alloc+0x31/0x9c0 [ 701.854827] __d_alloc+0x31/0x9c0 [ 701.855249] ? get_random_u32+0x3b2/0x670 [ 701.855747] d_alloc_pseudo+0x1d/0x70 [ 701.856218] alloc_file_pseudo+0xd2/0x260 [ 701.856728] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 701.857304] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 701.858118] ? __shmem_get_inode+0x6c4/0xe20 [ 701.858781] ? do_raw_spin_unlock+0x53/0x220 [ 701.859455] __shmem_file_setup+0x215/0x310 10:31:18 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04"], 0x82) 10:31:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 701.860107] __do_sys_memfd_create+0x385/0xa20 [ 701.860919] ? fput+0x2f/0x1a0 [ 701.861424] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 701.862163] ? __pfx_ksys_write+0x10/0x10 [ 701.862792] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 701.863566] do_syscall_64+0x3f/0x90 [ 701.864140] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 701.864886] RIP: 0033:0x7f0da2a8db19 [ 701.865430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.867954] RSP: 002b:00007f0da0002f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 701.869030] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f0da2a8db19 [ 701.870035] RDX: 00007f0da0003000 RSI: 0000000000000000 RDI: 00007f0da2ae70fb [ 701.871068] RBP: 0000000000000000 R08: 00007f0da0002ff8 R09: ffffffffffffffff [ 701.872077] R10: 00007f0da0002ffc R11: 0000000000000246 R12: 0000000020000040 [ 701.873083] R13: 0000000020000140 R14: 0000000000000000 R15: 00000000200018c0 [ 701.874114] [ 701.888084] EXT4-fs: Ignoring removed orlov option [ 701.891267] No source specified [ 701.901226] Bluetooth: hci4: Received unexpected HCI Event 0x00 10:31:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 10) 10:31:31 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 9) 10:31:31 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:31:31 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:31:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:31:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 9) 10:31:31 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04"], 0x82) 10:31:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x0, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 714.156716] loop4: detected capacity change from 0 to 512 [ 714.169937] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 714.171257] EXT4-fs (loop4): group descriptors corrupted! [ 714.187470] EXT4-fs: Ignoring removed orlov option [ 714.194111] No source specified [ 714.201088] syz-executor.7: attempt to access beyond end of device [ 714.201088] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 714.202895] Bluetooth: hci4: Received unexpected HCI Event 0x00 [ 714.209245] EXT4-fs (loop7): unable to read superblock 10:31:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 11) 10:31:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) 10:31:31 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 10) 10:31:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 10) 10:31:31 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffffff003f0849bc0600"], 0x82) 10:31:31 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r1, 0x540a, 0x2) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:31:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x0, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 714.387696] loop4: detected capacity change from 0 to 512 [ 714.393768] EXT4-fs: Ignoring removed orlov option [ 714.404285] No source specified [ 714.407006] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 714.408270] EXT4-fs (loop4): group descriptors corrupted! [ 714.413238] syz-executor.7: attempt to access beyond end of device [ 714.413238] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 714.417051] EXT4-fs (loop7): unable to read superblock 10:31:44 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04"], 0x82) 10:31:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 11) 10:31:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 11) 10:31:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 10:31:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 12) 10:31:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r1, 0x540a, 0x2) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:31:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x0, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:31:44 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 727.006494] FAULT_INJECTION: forcing a failure. [ 727.006494] name failslab, interval 1, probability 0, space 0, times 0 [ 727.007269] CPU: 1 PID: 6540 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 727.007760] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 727.008268] Call Trace: [ 727.008434] [ 727.008583] dump_stack_lvl+0xc1/0xf0 [ 727.008843] should_fail_ex+0x4b4/0x5b0 [ 727.009105] ? security_file_alloc+0x38/0x170 [ 727.009389] should_failslab+0x9/0x20 [ 727.009638] kmem_cache_alloc+0x61/0x390 [ 727.009905] security_file_alloc+0x38/0x170 [ 727.010174] ? kmem_cache_alloc+0x328/0x390 [ 727.010454] init_file+0x99/0x250 [ 727.010689] alloc_empty_file+0x94/0x1e0 [ 727.010983] alloc_file+0x5e/0x800 [ 727.011237] alloc_file_pseudo+0x16e/0x260 [ 727.011515] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 727.011827] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 727.012179] ? do_raw_spin_unlock+0x53/0x220 [ 727.012475] __shmem_file_setup+0x215/0x310 [ 727.012762] __do_sys_memfd_create+0x385/0xa20 [ 727.013051] ? fput+0x2f/0x1a0 [ 727.013269] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 727.013589] ? ksys_write+0x19e/0x250 [ 727.013863] ? __pfx_ksys_write+0x10/0x10 [ 727.014135] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 727.014468] do_syscall_64+0x3f/0x90 [ 727.014721] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 727.015046] RIP: 0033:0x7ffac4fc2b19 [ 727.015296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 727.016377] RSP: 002b:00007ffac2537f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 727.016841] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ffac4fc2b19 [ 727.017271] RDX: 0000000000000ffe RSI: 0000000000000000 RDI: 00007ffac501c0fb [ 727.017704] RBP: 0000000000000002 R08: 00000000000007ff R09: ffffffffffffffff [ 727.018135] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 727.018570] R13: 0000000020000100 R14: 0000000000040000 R15: 0000000020012800 [ 727.019015] 10:31:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 13) [ 727.064198] Bluetooth: hci4: Received unexpected HCI Event 0x00 [ 727.069114] syz-executor.7: attempt to access beyond end of device [ 727.069114] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 727.078498] EXT4-fs (loop7): unable to read superblock [ 727.093584] loop4: detected capacity change from 0 to 512 [ 727.104274] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 727.104909] EXT4-fs (loop4): group descriptors corrupted! 10:31:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 12) 10:31:44 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04"], 0x82) 10:31:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 12) 10:31:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 14) [ 727.157396] FAULT_INJECTION: forcing a failure. [ 727.157396] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 727.158442] CPU: 1 PID: 6556 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 727.158995] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 727.159550] Call Trace: [ 727.159733] [ 727.159898] dump_stack_lvl+0xc1/0xf0 [ 727.160179] should_fail_ex+0x4b4/0x5b0 [ 727.160470] __should_fail_alloc_page+0xe0/0x110 [ 727.160811] prepare_alloc_pages+0x178/0x500 [ 727.161136] __alloc_pages+0x149/0x480 [ 727.161418] ? __pfx___alloc_pages+0x10/0x10 [ 727.161732] ? inode_add_bytes+0x24/0xf0 [ 727.162028] ? lock_release+0x1e3/0x680 [ 727.162310] ? __pfx_lock_release+0x10/0x10 [ 727.162611] vma_alloc_folio+0xe2/0x480 [ 727.162881] shmem_alloc_folio+0x11c/0x1f0 [ 727.163197] ? __pfx_shmem_alloc_folio+0x10/0x10 [ 727.163506] ? __dquot_alloc_space+0x4da/0xb80 [ 727.163838] ? percpu_counter_add_batch+0xc8/0x180 [ 727.164186] shmem_get_folio_gfp.constprop.0+0x8ba/0x18c0 [ 727.164575] ? __pfx_lock_release+0x10/0x10 [ 727.164866] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 727.165280] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 727.165673] shmem_write_begin+0x148/0x360 [ 727.165979] ? __pfx_shmem_write_begin+0x10/0x10 [ 727.166300] generic_perform_write+0x26f/0x5e0 [ 727.166610] ? __pfx_generic_perform_write+0x10/0x10 [ 727.166940] ? __pfx_file_update_time+0x10/0x10 [ 727.167271] ? __pfx_generic_write_checks+0x10/0x10 [ 727.167599] __generic_file_write_iter+0x160/0x1a0 [ 727.167949] generic_file_write_iter+0xe7/0x350 [ 727.168254] vfs_write+0x97d/0xda0 [ 727.168510] ? __pfx_vfs_write+0x10/0x10 [ 727.168793] __x64_sys_pwrite64+0x1f6/0x250 [ 727.169105] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 727.169419] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 727.169790] do_syscall_64+0x3f/0x90 [ 727.170045] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 727.170395] RIP: 0033:0x7ffac4f75ab7 [ 727.170634] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 727.171853] RSP: 002b:00007ffac2537f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 727.172329] RAX: ffffffffffffffda RBX: 00007ffac500c970 RCX: 00007ffac4f75ab7 [ 727.172767] RDX: 000000000000003a RSI: 0000000020000340 RDI: 0000000000000004 [ 727.173208] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 727.173641] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 727.174075] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 727.174524] [ 727.199293] Bluetooth: hci4: Received unexpected HCI Event 0x00 [ 727.214331] FAULT_INJECTION: forcing a failure. [ 727.214331] name failslab, interval 1, probability 0, space 0, times 0 [ 727.215837] CPU: 0 PID: 6562 Comm: syz-executor.2 Not tainted 6.5.0-rc4-next-20230731 #1 [ 727.216800] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 727.217776] Call Trace: [ 727.218094] [ 727.218385] dump_stack_lvl+0xc1/0xf0 [ 727.218889] should_fail_ex+0x4b4/0x5b0 [ 727.219432] ? security_file_alloc+0x38/0x170 [ 727.219994] should_failslab+0x9/0x20 [ 727.220474] kmem_cache_alloc+0x61/0x390 [ 727.220998] security_file_alloc+0x38/0x170 [ 727.221530] ? kmem_cache_alloc+0x328/0x390 [ 727.222071] init_file+0x99/0x250 [ 727.222542] alloc_empty_file+0x94/0x1e0 [ 727.222594] FAULT_INJECTION: forcing a failure. [ 727.222594] name failslab, interval 1, probability 0, space 0, times 0 [ 727.223213] alloc_file+0x5e/0x800 [ 727.224498] alloc_file_pseudo+0x16e/0x260 [ 727.225212] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 727.225995] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 727.226816] ? do_raw_spin_unlock+0x53/0x220 [ 727.227453] __shmem_file_setup+0x215/0x310 [ 727.228028] __do_sys_memfd_create+0x385/0xa20 [ 727.228668] ? fput+0x2f/0x1a0 [ 727.229097] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 727.229749] ? __pfx_ksys_write+0x10/0x10 [ 727.230277] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 727.230967] do_syscall_64+0x3f/0x90 [ 727.231502] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 727.232142] RIP: 0033:0x7f1977c7ab19 [ 727.232616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 727.234756] RSP: 002b:00007f19751eff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 727.235706] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f1977c7ab19 [ 727.236610] RDX: 00007f19751f0000 RSI: 0000000000000000 RDI: 00007f1977cd40fb [ 727.237510] RBP: 0000000000000000 R08: 00007f19751efff8 R09: ffffffffffffffff [ 727.238416] R10: 00007f19751efffc R11: 0000000000000246 R12: 0000000020000040 [ 727.239328] R13: 0000000020000140 R14: 0000000000000000 R15: 00000000200018c0 [ 727.240255] [ 727.240564] CPU: 1 PID: 6560 Comm: syz-executor.7 Not tainted 6.5.0-rc4-next-20230731 #1 [ 727.241067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 727.241565] Call Trace: [ 727.241729] [ 727.241878] dump_stack_lvl+0xc1/0xf0 [ 727.242141] should_fail_ex+0x4b4/0x5b0 [ 727.242409] ? security_file_alloc+0x38/0x170 [ 727.242695] should_failslab+0x9/0x20 [ 727.242943] kmem_cache_alloc+0x61/0x390 [ 727.243229] security_file_alloc+0x38/0x170 [ 727.243502] ? kmem_cache_alloc+0x328/0x390 [ 727.243781] init_file+0x99/0x250 [ 727.244022] alloc_empty_file+0x94/0x1e0 [ 727.244294] alloc_file+0x5e/0x800 [ 727.244536] alloc_file_pseudo+0x16e/0x260 [ 727.244812] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 727.245117] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 727.245474] ? do_raw_spin_unlock+0x53/0x220 [ 727.245766] __shmem_file_setup+0x215/0x310 [ 727.246048] __do_sys_memfd_create+0x385/0xa20 [ 727.246339] ? fput+0x2f/0x1a0 [ 727.246558] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 727.246877] ? __pfx_ksys_write+0x10/0x10 [ 727.247152] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 727.247489] do_syscall_64+0x3f/0x90 [ 727.247743] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 727.248067] RIP: 0033:0x7f0da2a8db19 [ 727.248301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 727.249368] RSP: 002b:00007f0da0002f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 727.249826] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f0da2a8db19 [ 727.250260] RDX: 00007f0da0003000 RSI: 0000000000000000 RDI: 00007f0da2ae70fb [ 727.250688] RBP: 0000000000000000 R08: 00007f0da0002ff8 R09: ffffffffffffffff [ 727.251136] R10: 00007f0da0002ffc R11: 0000000000000246 R12: 0000000020000040 [ 727.251585] R13: 0000000020000140 R14: 0000000000000000 R15: 00000000200018c0 [ 727.252039] [ 727.255452] loop4: detected capacity change from 0 to 512 [ 727.260207] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:31:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 13) 10:31:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 15) 10:31:57 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r1, 0x540a, 0x2) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:31:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 10:31:57 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000c00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:31:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x0, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:31:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 13) 10:31:57 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04"], 0x82) [ 740.157967] Bluetooth: hci4: Received unexpected HCI Event 0x00 [ 740.171639] FAULT_INJECTION: forcing a failure. [ 740.171639] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 740.172553] CPU: 1 PID: 6595 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 740.173122] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 740.173699] Call Trace: [ 740.173893] [ 740.174068] dump_stack_lvl+0xc1/0xf0 [ 740.174370] should_fail_ex+0x4b4/0x5b0 [ 740.174670] ? page_copy_sane+0xcc/0x2b0 [ 740.174980] copy_page_from_iter_atomic+0x28d/0x1560 [ 740.175363] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 740.175802] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 740.176199] ? shmem_write_begin+0x15f/0x360 [ 740.176536] ? __pfx_shmem_write_begin+0x10/0x10 [ 740.176899] generic_perform_write+0x2e8/0x5e0 [ 740.177252] ? __pfx_generic_perform_write+0x10/0x10 [ 740.177627] ? __pfx_file_update_time+0x10/0x10 [ 740.177943] ? __pfx_generic_write_checks+0x10/0x10 [ 740.178320] __generic_file_write_iter+0x160/0x1a0 [ 740.178677] generic_file_write_iter+0xe7/0x350 [ 740.179027] vfs_write+0x97d/0xda0 [ 740.179310] ? __pfx_vfs_write+0x10/0x10 [ 740.179633] __x64_sys_pwrite64+0x1f6/0x250 [ 740.179952] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 740.180311] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 740.180696] do_syscall_64+0x3f/0x90 [ 740.180984] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 740.181357] RIP: 0033:0x7ffac4f75ab7 [ 740.181623] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 740.182857] RSP: 002b:00007ffac2537f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 740.183409] RAX: ffffffffffffffda RBX: 00007ffac500c970 RCX: 00007ffac4f75ab7 [ 740.183910] RDX: 000000000000003a RSI: 0000000020000340 RDI: 0000000000000004 [ 740.184405] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 740.184904] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 740.185399] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 740.185917] [ 740.210863] syz-executor.7: attempt to access beyond end of device [ 740.210863] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 740.220759] EXT4-fs (loop7): unable to read superblock 10:31:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x0, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 740.239496] loop4: detected capacity change from 0 to 512 10:31:57 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ffffffffff"], 0x82) [ 740.274737] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 740.276087] EXT4-fs (loop4): group descriptors corrupted! 10:32:09 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04"], 0x82) 10:32:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 14) 10:32:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x0, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:32:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 16) 10:32:09 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:32:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 10:32:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r2, 0x540a, 0x2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:32:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 14) [ 752.880150] FAULT_INJECTION: forcing a failure. [ 752.880150] name failslab, interval 1, probability 0, space 0, times 0 [ 752.880960] CPU: 0 PID: 6627 Comm: syz-executor.2 Not tainted 6.5.0-rc4-next-20230731 #1 [ 752.881485] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 752.882014] Call Trace: [ 752.882190] [ 752.882345] dump_stack_lvl+0xc1/0xf0 [ 752.882622] should_fail_ex+0x4b4/0x5b0 [ 752.882902] ? getname_flags.part.0+0x50/0x4f0 [ 752.883218] should_failslab+0x9/0x20 [ 752.883489] kmem_cache_alloc+0x61/0x390 [ 752.883778] getname_flags.part.0+0x50/0x4f0 [ 752.884089] getname+0x92/0xe0 [ 752.884314] do_sys_openat2+0xec/0x1d0 [ 752.884591] ? __pfx_do_sys_openat2+0x10/0x10 [ 752.884909] ? perf_trace_preemptirq_template+0x252/0x420 [ 752.885294] __x64_sys_openat+0x143/0x200 [ 752.885584] ? __pfx___x64_sys_openat+0x10/0x10 [ 752.885913] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 752.886271] do_syscall_64+0x3f/0x90 [ 752.886537] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 752.886883] RIP: 0033:0x7f1977c2da04 [ 752.887134] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 752.888321] RSP: 002b:00007f19751efed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 752.888820] RAX: ffffffffffffffda RBX: 00007f1977cc4970 RCX: 00007f1977c2da04 [ 752.889277] RDX: 0000000000000002 RSI: 00007f19751f0000 RDI: 00000000ffffff9c [ 752.889757] RBP: 00007f19751f0000 R08: 0000000000000000 R09: ffffffffffffffff [ 752.890246] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 752.890722] R13: 0000000000000005 R14: 0000000020000240 R15: 0000000000000000 [ 752.891223] 10:32:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 15) [ 752.945287] Bluetooth: hci4: Received unexpected HCI Event 0x00 [ 752.950762] FAULT_INJECTION: forcing a failure. [ 752.950762] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 752.951325] FAULT_INJECTION: forcing a failure. [ 752.951325] name failslab, interval 1, probability 0, space 0, times 0 [ 752.951633] CPU: 0 PID: 6639 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 752.953347] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 752.953895] Call Trace: [ 752.954085] [ 752.954243] dump_stack_lvl+0xc1/0xf0 [ 752.954518] should_fail_ex+0x4b4/0x5b0 [ 752.954807] ? page_copy_sane+0xcc/0x2b0 [ 752.955098] copy_page_from_iter_atomic+0x28d/0x1560 [ 752.955467] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 752.955900] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 752.956309] ? shmem_write_begin+0x15f/0x360 [ 752.956644] ? __pfx_shmem_write_begin+0x10/0x10 [ 752.956999] generic_perform_write+0x2e8/0x5e0 [ 752.957353] ? __pfx_generic_perform_write+0x10/0x10 [ 752.957734] ? __pfx_file_update_time+0x10/0x10 [ 752.958057] ? __pfx_generic_write_checks+0x10/0x10 [ 752.958427] __generic_file_write_iter+0x160/0x1a0 [ 752.958794] generic_file_write_iter+0xe7/0x350 [ 752.959137] vfs_write+0x97d/0xda0 [ 752.959413] ? __pfx_vfs_write+0x10/0x10 [ 752.959720] __x64_sys_pwrite64+0x1f6/0x250 [ 752.960044] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 752.960396] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 752.960790] do_syscall_64+0x3f/0x90 [ 752.961078] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 752.961453] RIP: 0033:0x7ffac4f75ab7 [ 752.961724] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 752.962982] RSP: 002b:00007ffac2537f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 752.963543] RAX: ffffffffffffffda RBX: 00007ffac500c970 RCX: 00007ffac4f75ab7 [ 752.964071] RDX: 0000000000000047 RSI: 0000000020010400 RDI: 0000000000000004 [ 752.964582] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 752.965093] R10: 00000000000007ff R11: 0000000000000293 R12: 0000000000000004 [ 752.965620] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 752.966143] [ 752.966318] CPU: 1 PID: 6637 Comm: syz-executor.7 Not tainted 6.5.0-rc4-next-20230731 #1 [ 752.967223] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 752.968125] Call Trace: [ 752.968418] [ 752.968681] dump_stack_lvl+0xc1/0xf0 [ 752.969144] should_fail_ex+0x4b4/0x5b0 [ 752.969615] ? getname_flags.part.0+0x50/0x4f0 [ 752.970149] should_failslab+0x9/0x20 [ 752.970599] kmem_cache_alloc+0x61/0x390 [ 752.971085] getname_flags.part.0+0x50/0x4f0 [ 752.971626] getname+0x92/0xe0 [ 752.972006] do_sys_openat2+0xec/0x1d0 [ 752.972469] ? __pfx_do_sys_openat2+0x10/0x10 [ 752.973007] ? perf_trace_preemptirq_template+0x252/0x420 [ 752.973647] __x64_sys_openat+0x143/0x200 [ 752.974137] ? __pfx___x64_sys_openat+0x10/0x10 [ 752.974695] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 752.975302] do_syscall_64+0x3f/0x90 [ 752.975763] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 752.976350] RIP: 0033:0x7f0da2a40a04 [ 752.976760] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 752.978701] RSP: 002b:00007f0da0002ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 752.979534] RAX: ffffffffffffffda RBX: 00007f0da2ad7970 RCX: 00007f0da2a40a04 [ 752.980311] RDX: 0000000000000002 RSI: 00007f0da0003000 RDI: 00000000ffffff9c [ 752.981090] RBP: 00007f0da0003000 R08: 0000000000000000 R09: ffffffffffffffff [ 752.981868] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 752.982647] R13: 0000000000000005 R14: 0000000020000240 R15: 0000000000000000 [ 752.983471] 10:32:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x0, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:32:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}, {@orlov}]}) 10:32:10 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04"], 0x82) [ 753.049878] loop4: detected capacity change from 0 to 512 10:32:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 16) [ 753.070157] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 753.070829] EXT4-fs (loop4): group descriptors corrupted! [ 753.081323] EXT4-fs: Ignoring removed orlov option [ 753.081969] syz-executor.3: attempt to access beyond end of device [ 753.081969] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 10:32:10 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 15) [ 753.090513] EXT4-fs (loop3): unable to read superblock 10:32:10 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r2, 0x540a, 0x2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:32:10 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:32:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 17) [ 753.128766] Bluetooth: hci4: Received unexpected HCI Event 0x00 [ 753.168887] FAULT_INJECTION: forcing a failure. [ 753.168887] name failslab, interval 1, probability 0, space 0, times 0 [ 753.169675] CPU: 0 PID: 6657 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 753.170211] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 753.170751] Call Trace: [ 753.170925] [ 753.171080] dump_stack_lvl+0xc1/0xf0 [ 753.171357] should_fail_ex+0x4b4/0x5b0 [ 753.171656] ? getname_flags.part.0+0x50/0x4f0 [ 753.171980] should_failslab+0x9/0x20 [ 753.172252] kmem_cache_alloc+0x61/0x390 [ 753.172546] getname_flags.part.0+0x50/0x4f0 [ 753.172864] getname+0x92/0xe0 [ 753.173094] do_sys_openat2+0xec/0x1d0 [ 753.173371] ? __pfx_do_sys_openat2+0x10/0x10 [ 753.173694] __x64_sys_openat+0x143/0x200 [ 753.173991] ? __pfx___x64_sys_openat+0x10/0x10 [ 753.174316] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 753.174675] do_syscall_64+0x3f/0x90 [ 753.174946] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 753.175300] RIP: 0033:0x7ffac4f75a04 [ 753.175558] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 753.176708] RSP: 002b:00007ffac2537ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 753.177205] RAX: ffffffffffffffda RBX: 00007ffac500c970 RCX: 00007ffac4f75a04 [ 753.177670] RDX: 0000000000000002 RSI: 00007ffac2538000 RDI: 00000000ffffff9c [ 753.178134] RBP: 00007ffac2538000 R08: 0000000000000000 R09: ffffffffffffffff [ 753.178605] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 753.179066] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 753.179544] [ 753.181955] syz-executor.7: attempt to access beyond end of device [ 753.181955] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 753.190792] EXT4-fs (loop7): unable to read superblock 10:32:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 17) 10:32:22 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:32:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)={[{@resgid}]}) 10:32:22 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04"], 0x82) 10:32:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 18) 10:32:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x0, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:32:22 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 16) 10:32:22 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r2, 0x540a, 0x2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 765.104508] Bluetooth: hci4: Received unexpected HCI Event 0x00 [ 765.105872] FAULT_INJECTION: forcing a failure. [ 765.105872] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 765.106811] CPU: 1 PID: 6692 Comm: syz-executor.7 Not tainted 6.5.0-rc4-next-20230731 #1 [ 765.107377] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 765.107961] Call Trace: [ 765.108150] [ 765.108320] dump_stack_lvl+0xc1/0xf0 [ 765.108612] should_fail_ex+0x4b4/0x5b0 [ 765.108910] strncpy_from_user+0x38/0x340 [ 765.109222] getname_flags.part.0+0x95/0x4f0 [ 765.109553] getname+0x92/0xe0 [ 765.109780] do_sys_openat2+0xec/0x1d0 [ 765.110073] ? __pfx_do_sys_openat2+0x10/0x10 [ 765.110396] ? perf_trace_preemptirq_template+0x252/0x420 [ 765.110796] __x64_sys_openat+0x143/0x200 [ 765.111089] ? __pfx___x64_sys_openat+0x10/0x10 [ 765.111439] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 765.111809] do_syscall_64+0x3f/0x90 [ 765.112093] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 765.112467] RIP: 0033:0x7f0da2a40a04 [ 765.112725] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 765.113965] RSP: 002b:00007f0da0002ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 765.114466] RAX: ffffffffffffffda RBX: 00007f0da2ad7970 RCX: 00007f0da2a40a04 [ 765.114966] RDX: 0000000000000002 RSI: 00007f0da0003000 RDI: 00000000ffffff9c [ 765.115464] RBP: 00007f0da0003000 R08: 0000000000000000 R09: ffffffffffffffff [ 765.115970] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 765.116466] R13: 0000000000000005 R14: 0000000020000240 R15: 0000000000000000 [ 765.116972] [ 765.127517] FAULT_INJECTION: forcing a failure. [ 765.127517] name failslab, interval 1, probability 0, space 0, times 0 [ 765.128524] CPU: 1 PID: 6700 Comm: syz-executor.2 Not tainted 6.5.0-rc4-next-20230731 #1 [ 765.129085] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 765.129658] Call Trace: [ 765.129839] [ 765.130011] dump_stack_lvl+0xc1/0xf0 [ 765.130306] should_fail_ex+0x4b4/0x5b0 [ 765.130614] ? alloc_empty_file+0x76/0x1e0 [ 765.130922] should_failslab+0x9/0x20 [ 765.131201] kmem_cache_alloc+0x61/0x390 [ 765.131489] ? __lock_acquire+0x19b1/0x6340 [ 765.131820] alloc_empty_file+0x76/0x1e0 [ 765.132123] path_openat+0xd8/0x2710 [ 765.132407] ? __pfx_path_openat+0x10/0x10 [ 765.132716] do_filp_open+0x1ba/0x410 [ 765.132990] ? __pfx_do_filp_open+0x10/0x10 [ 765.133301] ? expand_files+0x446/0x8e0 [ 765.133598] ? find_held_lock+0x2c/0x110 [ 765.133905] ? alloc_fd+0x2eb/0x760 [ 765.134181] ? lock_release+0x1e3/0x680 [ 765.134463] ? do_raw_spin_lock+0x125/0x270 [ 765.134781] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 765.135127] ? _raw_spin_unlock+0x1e/0x40 [ 765.135423] ? alloc_fd+0x2eb/0x760 [ 765.135710] do_sys_openat2+0x164/0x1d0 [ 765.135993] ? __pfx_do_sys_openat2+0x10/0x10 [ 765.136328] ? find_held_lock+0x2c/0x110 [ 765.136614] ? do_syscall_64+0x3f/0x90 [ 765.136907] ? lock_release+0x1e3/0x680 [ 765.137201] __x64_sys_openat+0x143/0x200 [ 765.137493] ? __pfx___x64_sys_openat+0x10/0x10 [ 765.137849] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 765.138228] do_syscall_64+0x3f/0x90 [ 765.138508] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 765.138881] RIP: 0033:0x7f1977c2da04 [ 765.139149] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 765.139450] syz-executor.3: attempt to access beyond end of device [ 765.139450] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 765.140388] RSP: 002b:00007f19751efed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 765.140405] RAX: ffffffffffffffda RBX: 00007f1977cc4970 RCX: 00007f1977c2da04 [ 765.142279] RDX: 0000000000000002 RSI: 00007f19751f0000 RDI: 00000000ffffff9c [ 765.142775] RBP: 00007f19751f0000 R08: 0000000000000000 R09: ffffffffffffffff [ 765.143270] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 765.143781] R13: 0000000000000005 R14: 0000000020000240 R15: 0000000000000000 [ 765.144295] [ 765.145893] loop4: detected capacity change from 0 to 512 [ 765.147260] EXT4-fs (loop3): unable to read superblock [ 765.158558] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 765.159311] EXT4-fs (loop4): group descriptors corrupted! 10:32:22 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09ff"], 0x82) 10:32:22 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 17) 10:32:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) 10:32:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x0, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 765.222597] FAULT_INJECTION: forcing a failure. [ 765.222597] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 765.223483] CPU: 1 PID: 6706 Comm: syz-executor.7 Not tainted 6.5.0-rc4-next-20230731 #1 [ 765.224102] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 765.224637] Call Trace: [ 765.224824] [ 765.224993] dump_stack_lvl+0xc1/0xf0 [ 765.225283] should_fail_ex+0x4b4/0x5b0 [ 765.225580] strncpy_from_user+0x38/0x340 [ 765.225897] getname_flags.part.0+0x95/0x4f0 [ 765.226229] getname+0x92/0xe0 [ 765.226460] do_sys_openat2+0xec/0x1d0 [ 765.226753] ? __pfx_do_sys_openat2+0x10/0x10 [ 765.227071] ? perf_trace_preemptirq_template+0x252/0x420 [ 765.227472] __x64_sys_openat+0x143/0x200 [ 765.227768] ? __pfx___x64_sys_openat+0x10/0x10 [ 765.228111] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 765.228477] do_syscall_64+0x3f/0x90 [ 765.228759] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 765.229103] RIP: 0033:0x7f0da2a40a04 10:32:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 19) [ 765.229371] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 765.230718] RSP: 002b:00007f0da0002ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 765.231248] RAX: ffffffffffffffda RBX: 00007f0da2ad7970 RCX: 00007f0da2a40a04 [ 765.231760] RDX: 0000000000000002 RSI: 00007f0da0003000 RDI: 00000000ffffff9c [ 765.232255] RBP: 00007f0da0003000 R08: 0000000000000000 R09: ffffffffffffffff [ 765.232750] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 765.233245] R13: 0000000000000005 R14: 0000000020000240 R15: 0000000000000000 [ 765.233742] [ 765.251368] syz-executor.3: attempt to access beyond end of device [ 765.251368] loop3: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 765.263565] EXT4-fs (loop3): unable to read superblock 10:32:22 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:32:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 18) 10:32:22 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04"], 0x82) 10:32:22 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 765.276201] Bluetooth: hci4: Received unexpected HCI Event 0x00 [ 765.285766] FAULT_INJECTION: forcing a failure. [ 765.285766] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 765.286626] CPU: 1 PID: 6716 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 765.287185] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 765.287739] Call Trace: [ 765.287928] [ 765.288094] dump_stack_lvl+0xc1/0xf0 [ 765.288388] should_fail_ex+0x4b4/0x5b0 [ 765.288688] strncpy_from_user+0x38/0x340 [ 765.288998] getname_flags.part.0+0x95/0x4f0 [ 765.289329] getname+0x92/0xe0 [ 765.289568] do_sys_openat2+0xec/0x1d0 [ 765.289847] ? __pfx_do_sys_openat2+0x10/0x10 [ 765.290188] __x64_sys_openat+0x143/0x200 [ 765.290475] ? __pfx___x64_sys_openat+0x10/0x10 [ 765.290826] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 765.291187] do_syscall_64+0x3f/0x90 [ 765.291467] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 765.291826] RIP: 0033:0x7ffac4f75a04 [ 765.292090] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 765.293259] RSP: 002b:00007ffac2537ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 765.293792] RAX: ffffffffffffffda RBX: 00007ffac500c970 RCX: 00007ffac4f75a04 [ 765.294280] RDX: 0000000000000002 RSI: 00007ffac2538000 RDI: 00000000ffffff9c [ 765.294770] RBP: 00007ffac2538000 R08: 0000000000000000 R09: ffffffffffffffff [ 765.295266] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 765.295788] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 765.296291] 10:32:22 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04"], 0x82) 10:32:22 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 18) 10:32:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 19) [ 765.365545] Bluetooth: hci4: Received unexpected HCI Event 0x00 [ 765.378923] syz-executor.7: attempt to access beyond end of device [ 765.378923] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 765.383800] FAULT_INJECTION: forcing a failure. [ 765.383800] name failslab, interval 1, probability 0, space 0, times 0 [ 765.384569] CPU: 1 PID: 6728 Comm: syz-executor.2 Not tainted 6.5.0-rc4-next-20230731 #1 [ 765.385136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 765.385709] Call Trace: [ 765.385900] [ 765.386069] dump_stack_lvl+0xc1/0xf0 [ 765.386361] should_fail_ex+0x4b4/0x5b0 [ 765.386657] ? security_file_alloc+0x38/0x170 [ 765.386984] should_failslab+0x9/0x20 [ 765.387264] kmem_cache_alloc+0x61/0x390 [ 765.387553] security_file_alloc+0x38/0x170 [ 765.387863] init_file+0x99/0x250 [ 765.388130] alloc_empty_file+0x94/0x1e0 [ 765.388421] path_openat+0xd8/0x2710 [ 765.388702] ? __pfx_path_openat+0x10/0x10 [ 765.388995] do_filp_open+0x1ba/0x410 [ 765.389273] ? __pfx_do_filp_open+0x10/0x10 [ 765.389569] ? expand_files+0x446/0x8e0 [ 765.389870] ? find_held_lock+0x2c/0x110 [ 765.390163] ? alloc_fd+0x2eb/0x760 [ 765.390437] ? lock_release+0x1e3/0x680 [ 765.390714] ? do_raw_spin_lock+0x125/0x270 [ 765.391031] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 765.391368] ? _raw_spin_unlock+0x1e/0x40 [ 765.391673] ? alloc_fd+0x2eb/0x760 [ 765.391952] do_sys_openat2+0x164/0x1d0 [ 765.392253] ? __pfx_do_sys_openat2+0x10/0x10 [ 765.392588] ? find_held_lock+0x2c/0x110 [ 765.392896] ? do_syscall_64+0x3f/0x90 [ 765.393185] ? lock_release+0x1e3/0x680 [ 765.393479] __x64_sys_openat+0x143/0x200 [ 765.393784] ? __pfx___x64_sys_openat+0x10/0x10 [ 765.394134] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 765.394511] do_syscall_64+0x3f/0x90 [ 765.394782] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 765.395147] RIP: 0033:0x7f1977c2da04 [ 765.395398] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 765.396636] RSP: 002b:00007f19751efed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 765.397136] RAX: ffffffffffffffda RBX: 00007f1977cc4970 RCX: 00007f1977c2da04 [ 765.397636] RDX: 0000000000000002 RSI: 00007f19751f0000 RDI: 00000000ffffff9c [ 765.398134] RBP: 00007f19751f0000 R08: 0000000000000000 R09: ffffffffffffffff [ 765.398632] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 765.399138] R13: 0000000000000005 R14: 0000000020000240 R15: 0000000000000000 [ 765.399655] [ 765.405515] EXT4-fs (loop7): unable to read superblock 10:32:33 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x38, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan0\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}]}, 0x38}, 0x1, 0x0, 0x0, 0x200000c0}, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:32:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 20) 10:32:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:32:34 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04"], 0x82) 10:32:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 20) 10:32:34 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 19) 10:32:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0x0, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:32:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 776.967236] FAULT_INJECTION: forcing a failure. [ 776.967236] name failslab, interval 1, probability 0, space 0, times 0 [ 776.967980] CPU: 1 PID: 6766 Comm: syz-executor.7 Not tainted 6.5.0-rc4-next-20230731 #1 [ 776.968469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 776.968959] Call Trace: [ 776.969123] [ 776.969271] dump_stack_lvl+0xc1/0xf0 [ 776.969533] should_fail_ex+0x4b4/0x5b0 [ 776.969800] ? security_file_alloc+0x38/0x170 [ 776.970085] should_failslab+0x9/0x20 [ 776.970335] kmem_cache_alloc+0x61/0x390 [ 776.970605] security_file_alloc+0x38/0x170 [ 776.970878] init_file+0x99/0x250 [ 776.971116] alloc_empty_file+0x94/0x1e0 [ 776.971386] path_openat+0xd8/0x2710 [ 776.971636] ? __pfx_path_openat+0x10/0x10 [ 776.971909] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 776.972236] do_filp_open+0x1ba/0x410 [ 776.972487] ? __pfx_do_filp_open+0x10/0x10 [ 776.972759] ? expand_files+0x446/0x8e0 [ 776.973023] ? find_held_lock+0x2c/0x110 [ 776.973294] ? alloc_fd+0x2eb/0x760 [ 776.973538] ? lock_release+0x1e3/0x680 [ 776.973798] ? do_raw_spin_lock+0x125/0x270 [ 776.974081] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 776.974390] ? _raw_spin_unlock+0x1e/0x40 [ 776.974656] ? alloc_fd+0x2eb/0x760 [ 776.974907] do_sys_openat2+0x164/0x1d0 [ 776.975173] ? __pfx_do_sys_openat2+0x10/0x10 [ 776.975473] ? perf_trace_preemptirq_template+0x252/0x420 [ 776.975847] __x64_sys_openat+0x143/0x200 [ 776.976148] ? __pfx___x64_sys_openat+0x10/0x10 [ 776.976459] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 776.976797] do_syscall_64+0x3f/0x90 [ 776.977052] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 776.977377] RIP: 0033:0x7f0da2a40a04 [ 776.977613] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 776.978694] RSP: 002b:00007f0da0002ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 776.979160] RAX: ffffffffffffffda RBX: 00007f0da2ad7970 RCX: 00007f0da2a40a04 [ 776.979592] RDX: 0000000000000002 RSI: 00007f0da0003000 RDI: 00000000ffffff9c [ 776.980026] RBP: 00007f0da0003000 R08: 0000000000000000 R09: ffffffffffffffff [ 776.980457] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 776.980887] R13: 0000000000000005 R14: 0000000020000240 R15: 0000000000000000 [ 776.981333] [ 776.992409] Bluetooth: hci4: Received unexpected HCI Event 0x00 [ 777.011699] FAULT_INJECTION: forcing a failure. [ 777.011699] name failslab, interval 1, probability 0, space 0, times 0 [ 777.012454] CPU: 1 PID: 6773 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 777.012946] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 777.013440] Call Trace: [ 777.013605] [ 777.013757] dump_stack_lvl+0xc1/0xf0 [ 777.014014] should_fail_ex+0x4b4/0x5b0 [ 777.014282] ? alloc_empty_file+0x76/0x1e0 [ 777.014559] should_failslab+0x9/0x20 [ 777.014806] kmem_cache_alloc+0x61/0x390 [ 777.015078] ? __lock_acquire+0x19b1/0x6340 [ 777.015360] alloc_empty_file+0x76/0x1e0 [ 777.015631] path_openat+0xd8/0x2710 [ 777.015895] ? __pfx_path_openat+0x10/0x10 [ 777.016174] do_filp_open+0x1ba/0x410 [ 777.016421] ? __pfx_do_filp_open+0x10/0x10 [ 777.016694] ? expand_files+0x446/0x8e0 [ 777.016959] ? find_held_lock+0x2c/0x110 [ 777.017229] ? alloc_fd+0x2eb/0x760 [ 777.017476] ? lock_release+0x1e3/0x680 [ 777.017737] ? do_raw_spin_lock+0x125/0x270 [ 777.018018] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 777.018328] ? _raw_spin_unlock+0x1e/0x40 [ 777.018594] ? alloc_fd+0x2eb/0x760 [ 777.018846] do_sys_openat2+0x164/0x1d0 [ 777.019110] ? __pfx_do_sys_openat2+0x10/0x10 [ 777.019416] __x64_sys_openat+0x143/0x200 [ 777.019691] ? __pfx___x64_sys_openat+0x10/0x10 [ 777.020017] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 777.020353] do_syscall_64+0x3f/0x90 [ 777.020604] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 777.020952] RIP: 0033:0x7ffac4f75a04 [ 777.021192] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 777.022269] RSP: 002b:00007ffac2537ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 777.022730] RAX: ffffffffffffffda RBX: 00007ffac500c970 RCX: 00007ffac4f75a04 [ 777.023163] RDX: 0000000000000002 RSI: 00007ffac2538000 RDI: 00000000ffffff9c [ 777.023595] RBP: 00007ffac2538000 R08: 0000000000000000 R09: ffffffffffffffff [ 777.024041] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 777.024475] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 777.024923] 10:32:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 21) 10:32:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:32:34 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f"], 0x82) [ 777.075857] FAULT_INJECTION: forcing a failure. [ 777.075857] name failslab, interval 1, probability 0, space 0, times 0 [ 777.076792] CPU: 1 PID: 6779 Comm: syz-executor.2 Not tainted 6.5.0-rc4-next-20230731 #1 [ 777.077308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 777.077823] Call Trace: [ 777.077999] [ 777.078152] dump_stack_lvl+0xc1/0xf0 [ 777.078431] should_fail_ex+0x4b4/0x5b0 [ 777.078705] should_failslab+0x9/0x20 [ 777.078969] kmem_cache_alloc_lru+0x7a/0x680 [ 777.079264] ? perf_trace_lock+0xc1/0x480 [ 777.079551] ? __d_alloc+0x31/0x9c0 [ 777.079838] ? __d_alloc+0x31/0x9c0 [ 777.080088] __d_alloc+0x31/0x9c0 [ 777.080354] d_alloc_parallel+0x10e/0x1640 [ 777.080647] ? __d_lookup+0x247/0x4a0 [ 777.080926] ? lock_release+0x1e3/0x680 [ 777.081209] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 777.081610] ? __pfx_d_alloc_parallel+0x10/0x10 [ 777.081934] ? lock_is_held_type+0x9f/0x120 [ 777.082263] ? __d_lookup+0x269/0x4a0 [ 777.082535] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 777.082916] lookup_open.isra.0+0x909/0x1400 [ 777.083223] ? __pfx_lookup_open.isra.0+0x10/0x10 [ 777.083571] ? __mnt_want_write+0x1f4/0x2e0 [ 777.083885] path_openat+0x96c/0x2710 [ 777.084174] ? __pfx_path_openat+0x10/0x10 [ 777.084468] do_filp_open+0x1ba/0x410 [ 777.084749] ? __pfx_do_filp_open+0x10/0x10 [ 777.085062] ? expand_files+0x446/0x8e0 [ 777.085339] ? find_held_lock+0x2c/0x110 [ 777.085648] ? do_raw_spin_lock+0x125/0x270 [ 777.085939] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 777.086291] ? _raw_spin_unlock+0x1e/0x40 [ 777.086574] ? alloc_fd+0x2eb/0x760 [ 777.086867] do_sys_openat2+0x164/0x1d0 [ 777.087152] ? __pfx_do_sys_openat2+0x10/0x10 [ 777.087462] ? find_held_lock+0x2c/0x110 [ 777.087741] ? do_syscall_64+0x3f/0x90 [ 777.088017] ? lock_release+0x1e3/0x680 [ 777.088291] __x64_sys_openat+0x143/0x200 [ 777.088592] ? __pfx___x64_sys_openat+0x10/0x10 [ 777.088916] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 777.089268] do_syscall_64+0x3f/0x90 [ 777.089530] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 777.089917] RIP: 0033:0x7f1977c2da04 [ 777.090162] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 777.091472] RSP: 002b:00007f19751efed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 777.091956] RAX: ffffffffffffffda RBX: 00007f1977cc4970 RCX: 00007f1977c2da04 [ 777.092401] RDX: 0000000000000002 RSI: 00007f19751f0000 RDI: 00000000ffffff9c [ 777.092841] RBP: 00007f19751f0000 R08: 0000000000000000 R09: ffffffffffffffff [ 777.093284] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 777.093735] R13: 0000000000000005 R14: 0000000020000240 R15: 0000000000000000 [ 777.094265] 10:32:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 21) 10:32:34 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 20) 10:32:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 22) [ 777.252249] syz-executor.7: attempt to access beyond end of device [ 777.252249] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 777.255715] loop4: detected capacity change from 0 to 512 [ 777.256714] EXT4-fs (loop7): unable to read superblock [ 777.284353] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 777.286102] EXT4-fs (loop4): group descriptors corrupted! 10:32:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 22) 10:32:46 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 21) 10:32:46 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f"], 0x82) 10:32:46 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:32:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:32:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0x0, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:32:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 23) 10:32:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 789.485756] FAULT_INJECTION: forcing a failure. [ 789.485756] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 789.486831] CPU: 1 PID: 6822 Comm: syz-executor.2 Not tainted 6.5.0-rc4-next-20230731 #1 [ 789.487367] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 789.487895] Call Trace: [ 789.488082] [ 789.488245] dump_stack_lvl+0xc1/0xf0 [ 789.488526] should_fail_ex+0x4b4/0x5b0 [ 789.488811] _copy_to_user+0x30/0xc0 [ 789.489084] simple_read_from_buffer+0xd0/0x170 [ 789.489410] proc_fail_nth_read+0x1a6/0x290 [ 789.489726] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 789.490059] ? security_file_permission+0xb5/0xe0 [ 789.490392] vfs_read+0x1de/0x8f0 [ 789.490636] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 789.490977] ? __pfx_vfs_read+0x10/0x10 [ 789.491256] ? __fget_files+0x267/0x480 [ 789.491549] ksys_read+0x122/0x250 [ 789.491805] ? __pfx_ksys_read+0x10/0x10 [ 789.492102] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 789.492465] do_syscall_64+0x3f/0x90 [ 789.492734] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 789.493086] RIP: 0033:0x7f1977c2d69c [ 789.493348] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 789.494521] RSP: 002b:00007f19751f0170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 789.495025] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f1977c2d69c [ 789.495502] RDX: 000000000000000f RSI: 00007f19751f01e0 RDI: 0000000000000004 [ 789.496017] RBP: 00007f19751f01d0 R08: 0000000000000000 R09: ffffffffffffffff [ 789.496531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 789.497039] R13: 00007ffe00e9370f R14: 00007f19751f0300 R15: 0000000000022000 [ 789.497563] [ 789.521641] FAULT_INJECTION: forcing a failure. [ 789.521641] name failslab, interval 1, probability 0, space 0, times 0 [ 789.523156] CPU: 0 PID: 6828 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 789.524212] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 789.525257] Call Trace: [ 789.525602] [ 789.525912] dump_stack_lvl+0xc1/0xf0 [ 789.526452] should_fail_ex+0x4b4/0x5b0 [ 789.527004] ? security_file_alloc+0x38/0x170 [ 789.527597] should_failslab+0x9/0x20 [ 789.527695] FAULT_INJECTION: forcing a failure. [ 789.527695] name failslab, interval 1, probability 0, space 0, times 0 [ 789.528110] kmem_cache_alloc+0x61/0x390 [ 789.529386] security_file_alloc+0x38/0x170 [ 789.529960] init_file+0x99/0x250 [ 789.530451] alloc_empty_file+0x94/0x1e0 [ 789.531017] path_openat+0xd8/0x2710 [ 789.531537] ? __pfx_path_openat+0x10/0x10 [ 789.532132] do_filp_open+0x1ba/0x410 [ 789.532648] ? __pfx_do_filp_open+0x10/0x10 [ 789.533218] ? expand_files+0x446/0x8e0 [ 789.533781] ? find_held_lock+0x2c/0x110 [ 789.534344] ? alloc_fd+0x2eb/0x760 [ 789.534851] ? lock_release+0x1e3/0x680 [ 789.535393] ? do_raw_spin_lock+0x125/0x270 [ 789.535986] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 789.536625] ? _raw_spin_unlock+0x1e/0x40 [ 789.537177] ? alloc_fd+0x2eb/0x760 [ 789.537698] do_sys_openat2+0x164/0x1d0 [ 789.538250] ? __pfx_do_sys_openat2+0x10/0x10 [ 789.538888] __x64_sys_openat+0x143/0x200 [ 789.539449] ? __pfx___x64_sys_openat+0x10/0x10 [ 789.540110] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 789.540821] do_syscall_64+0x3f/0x90 [ 789.541341] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 789.542017] RIP: 0033:0x7ffac4f75a04 [ 789.542510] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 789.544858] RSP: 002b:00007ffac2537ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 789.545854] RAX: ffffffffffffffda RBX: 00007ffac500c970 RCX: 00007ffac4f75a04 [ 789.546784] RDX: 0000000000000002 RSI: 00007ffac2538000 RDI: 00000000ffffff9c [ 789.547716] RBP: 00007ffac2538000 R08: 0000000000000000 R09: ffffffffffffffff [ 789.548668] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 789.549594] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 789.550558] [ 789.550888] CPU: 1 PID: 6831 Comm: syz-executor.7 Not tainted 6.5.0-rc4-next-20230731 #1 [ 789.551923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 789.552923] Call Trace: [ 789.553251] [ 789.553549] dump_stack_lvl+0xc1/0xf0 [ 789.554058] should_fail_ex+0x4b4/0x5b0 [ 789.554575] ? __kernfs_new_node+0xd4/0x890 [ 789.555129] should_failslab+0x9/0x20 [ 789.555615] kmem_cache_alloc+0x61/0x390 [ 789.556146] ? __pfx_avc_has_perm+0x10/0x10 [ 789.556683] __kernfs_new_node+0xd4/0x890 [ 789.557225] ? __pfx___kernfs_new_node+0x10/0x10 [ 789.557831] ? selinux_sb_statfs+0x1b5/0x240 [ 789.558400] ? __pfx_selinux_sb_statfs+0x10/0x10 [ 789.559014] ? __pfx_perf_trace_lock+0x10/0x10 [ 789.559594] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 789.560246] ? shmem_statfs+0x1b7/0x3e0 [ 789.560772] kernfs_create_dir_ns+0xa0/0x230 [ 789.561338] internal_create_group+0x713/0xb00 [ 789.561945] ? __pfx_internal_create_group+0x10/0x10 [ 789.562614] loop_configure+0xce5/0x1910 [ 789.563152] lo_ioctl+0x934/0x19a0 [ 789.563621] ? __x64_sys_openat+0x143/0x200 [ 789.564229] ? do_syscall_64+0x3f/0x90 [ 789.564739] ? __pfx_lo_ioctl+0x10/0x10 [ 789.565243] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 789.565881] ? __pfx_perf_tp_event+0x10/0x10 [ 789.566432] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 789.567062] ? __lock_acquire+0xc3f/0x6340 [ 789.567620] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 789.568436] ? perf_trace_preemptirq_template+0x252/0x420 [ 789.569127] ? __pfx_lo_ioctl+0x10/0x10 [ 789.569641] blkdev_ioctl+0x2e4/0x750 [ 789.570147] ? __pfx_blkdev_ioctl+0x10/0x10 [ 789.570696] ? selinux_file_ioctl+0xba/0x270 [ 789.571271] ? __pfx_blkdev_ioctl+0x10/0x10 [ 789.571826] __x64_sys_ioctl+0x1a4/0x210 [ 789.572375] do_syscall_64+0x3f/0x90 [ 789.572870] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 789.573511] RIP: 0033:0x7f0da2a8d8d7 [ 789.573974] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 789.576134] RSP: 002b:00007f0da0002f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 789.577065] RAX: ffffffffffffffda RBX: 00007f0da2ad7970 RCX: 00007f0da2a8d8d7 [ 789.577921] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 789.578785] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 789.579644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 789.580528] R13: 0000000000000005 R14: 0000000020000240 R15: 0000000000000000 [ 789.581403] 10:32:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) 10:32:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0x0, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:32:46 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f"], 0x82) [ 789.712501] syz-executor.7: attempt to access beyond end of device [ 789.712501] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 10:32:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 23) [ 789.719830] EXT4-fs (loop7): unable to read superblock [ 789.806990] loop4: detected capacity change from 0 to 512 [ 789.818107] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 789.819472] EXT4-fs (loop4): group descriptors corrupted! 10:32:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x2, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) 10:32:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 24) 10:32:59 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09"], 0x82) 10:32:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 22) 10:32:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x0, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:32:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd}, 0x9, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:32:59 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x10) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:32:59 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 801.969687] syz-executor.7: attempt to access beyond end of device [ 801.969687] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 801.970535] EXT4-fs (loop7): unable to read superblock 10:32:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 23) [ 802.031617] FAULT_INJECTION: forcing a failure. [ 802.031617] name failslab, interval 1, probability 0, space 0, times 0 [ 802.033220] CPU: 1 PID: 6871 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 802.034265] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 802.035319] Call Trace: [ 802.035665] [ 802.035976] dump_stack_lvl+0xc1/0xf0 [ 802.036524] should_fail_ex+0x4b4/0x5b0 [ 802.037071] ? __kernfs_new_node+0xd4/0x890 [ 802.037677] should_failslab+0x9/0x20 [ 802.038204] kmem_cache_alloc+0x61/0x390 [ 802.038756] ? __pfx_avc_has_perm+0x10/0x10 [ 802.039324] __kernfs_new_node+0xd4/0x890 [ 802.039890] ? __pfx___kernfs_new_node+0x10/0x10 [ 802.040537] ? selinux_sb_statfs+0x1b5/0x240 [ 802.041138] ? __pfx_selinux_sb_statfs+0x10/0x10 [ 802.041780] ? __pfx_perf_trace_lock+0x10/0x10 [ 802.042389] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 802.043046] ? shmem_statfs+0x1b7/0x3e0 [ 802.043584] kernfs_create_dir_ns+0xa0/0x230 [ 802.044194] internal_create_group+0x713/0xb00 [ 802.044832] ? __pfx_internal_create_group+0x10/0x10 [ 802.045533] loop_configure+0xce5/0x1910 [ 802.046097] lo_ioctl+0x934/0x19a0 [ 802.046590] ? kmem_cache_free+0x10d/0x4d0 [ 802.047130] ? __x64_sys_openat+0x143/0x200 [ 802.047713] ? do_syscall_64+0x3f/0x90 [ 802.048259] ? __pfx_lo_ioctl+0x10/0x10 [ 802.048782] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 802.049446] ? perf_trace_lock+0xc1/0x480 [ 802.050004] ? __pfx_perf_trace_lock+0x10/0x10 [ 802.050622] ? __lock_acquire+0xc3f/0x6340 [ 802.051196] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 802.052004] ? __pfx_do_sys_openat2+0x10/0x10 [ 802.052634] ? xfd_validate_state+0x51/0x170 [ 802.053222] ? __pfx_lo_ioctl+0x10/0x10 [ 802.053752] blkdev_ioctl+0x2e4/0x750 [ 802.054277] ? __pfx_blkdev_ioctl+0x10/0x10 [ 802.054849] ? selinux_file_ioctl+0xba/0x270 [ 802.055441] ? __pfx_blkdev_ioctl+0x10/0x10 [ 802.056015] __x64_sys_ioctl+0x1a4/0x210 [ 802.056589] do_syscall_64+0x3f/0x90 [ 802.057101] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 802.057769] RIP: 0033:0x7ffac4fc28d7 [ 802.058251] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 802.060488] RSP: 002b:00007ffac2537f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 802.061412] RAX: ffffffffffffffda RBX: 00007ffac500c970 RCX: 00007ffac4fc28d7 [ 802.062267] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 802.063141] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 802.064012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 802.064874] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 802.065120] FAULT_INJECTION: forcing a failure. [ 802.065120] name failslab, interval 1, probability 0, space 0, times 0 [ 802.065758] [ 802.066779] CPU: 0 PID: 6875 Comm: syz-executor.7 Not tainted 6.5.0-rc4-next-20230731 #1 [ 802.066843] loop4: detected capacity change from 0 to 512 [ 802.067322] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 802.067333] Call Trace: [ 802.067338] [ 802.067345] dump_stack_lvl+0xc1/0xf0 [ 802.069164] should_fail_ex+0x4b4/0x5b0 [ 802.069455] ? __kernfs_new_node+0xd4/0x890 [ 802.069770] should_failslab+0x9/0x20 [ 802.070047] kmem_cache_alloc+0x61/0x390 [ 802.070337] ? find_held_lock+0x2c/0x110 [ 802.070637] __kernfs_new_node+0xd4/0x890 [ 802.070940] ? __pfx___kernfs_new_node+0x10/0x10 [ 802.071292] ? find_held_lock+0x2c/0x110 [ 802.071588] ? kernfs_add_one+0x3d5/0x530 [ 802.071865] ? lock_release+0x1e3/0x680 [ 802.072173] ? __pfx_lock_release+0x10/0x10 [ 802.072502] kernfs_new_node+0x97/0x120 [ 802.072793] __kernfs_create_file+0x55/0x350 [ 802.073120] sysfs_add_file_mode_ns+0x21c/0x440 [ 802.073468] ? __pfx_dev_attr_store+0x10/0x10 [ 802.073797] internal_create_group+0x322/0xb00 [ 802.074129] ? __pfx_internal_create_group+0x10/0x10 [ 802.074502] ? __pfx_noop_fsync+0x10/0x10 [ 802.074800] ? blk_queue_write_cache+0x85/0xf0 [ 802.075136] loop_configure+0xce5/0x1910 [ 802.075428] lo_ioctl+0x934/0x19a0 [ 802.075700] ? __x64_sys_openat+0x143/0x200 [ 802.075989] ? do_syscall_64+0x3f/0x90 [ 802.076282] ? __pfx_lo_ioctl+0x10/0x10 [ 802.076558] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 802.076914] ? __pfx_perf_tp_event+0x10/0x10 [ 802.077217] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 802.077562] ? __lock_acquire+0xc3f/0x6340 [ 802.077880] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 802.078338] ? perf_trace_preemptirq_template+0x252/0x420 [ 802.078729] ? __pfx_lo_ioctl+0x10/0x10 [ 802.079012] blkdev_ioctl+0x2e4/0x750 [ 802.079301] ? __pfx_blkdev_ioctl+0x10/0x10 [ 802.079598] ? selinux_file_ioctl+0xba/0x270 [ 802.079931] ? __pfx_blkdev_ioctl+0x10/0x10 [ 802.080265] __x64_sys_ioctl+0x1a4/0x210 [ 802.080580] do_syscall_64+0x3f/0x90 [ 802.080859] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 802.081229] RIP: 0033:0x7f0da2a8d8d7 [ 802.081492] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 802.082704] RSP: 002b:00007f0da0002f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 802.083205] RAX: ffffffffffffffda RBX: 00007f0da2ad7970 RCX: 00007f0da2a8d8d7 [ 802.083704] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 802.084190] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 802.084653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 802.085115] R13: 0000000000000005 R14: 0000000020000240 R15: 0000000000000000 [ 802.085593] 10:32:59 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f"], 0x82) 10:32:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x3, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) [ 802.126919] loop3: detected capacity change from 0 to 1 [ 802.143863] EXT4-fs: Ignoring removed orlov option [ 802.147549] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 802.148844] EXT4-fs (loop4): group descriptors corrupted! [ 802.149343] syz-executor.7: attempt to access beyond end of device [ 802.149343] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 802.150810] EXT4-fs (loop7): unable to read superblock 10:32:59 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r3, 0x540a, 0x2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r5, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 802.172079] EXT4-fs (loop3): unable to read superblock 10:32:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 24) 10:32:59 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:32:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 25) 10:32:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd}, 0x9, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:32:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x4, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) [ 802.313753] syz-executor.7: attempt to access beyond end of device [ 802.313753] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 10:32:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd}, 0x9, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:32:59 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f"], 0x82) [ 802.322689] EXT4-fs (loop7): unable to read superblock [ 802.325787] loop4: detected capacity change from 0 to 512 10:32:59 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000100)={0x401, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r2, 0x540a, 0x2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 802.342344] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 802.343000] EXT4-fs (loop4): group descriptors corrupted! 10:32:59 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 25) 10:32:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 26) [ 802.460176] syz-executor.7: attempt to access beyond end of device [ 802.460176] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 802.461001] EXT4-fs (loop7): unable to read superblock [ 802.502996] loop3: detected capacity change from 0 to 1 [ 802.518731] EXT4-fs: Ignoring removed orlov option [ 802.527075] EXT4-fs (loop3): unable to read superblock [ 802.536159] FAULT_INJECTION: forcing a failure. [ 802.536159] name failslab, interval 1, probability 0, space 0, times 0 [ 802.536928] CPU: 0 PID: 6907 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 802.537476] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 802.538030] Call Trace: [ 802.538214] [ 802.538381] dump_stack_lvl+0xc1/0xf0 [ 802.538670] should_fail_ex+0x4b4/0x5b0 [ 802.538977] ? __kernfs_new_node+0xd4/0x890 [ 802.539311] should_failslab+0x9/0x20 [ 802.539600] kmem_cache_alloc+0x61/0x390 [ 802.539899] ? find_held_lock+0x2c/0x110 [ 802.540222] __kernfs_new_node+0xd4/0x890 [ 802.540522] ? __pfx___kernfs_new_node+0x10/0x10 [ 802.540862] ? find_held_lock+0x2c/0x110 [ 802.541166] ? kernfs_add_one+0x3d5/0x530 [ 802.541455] ? lock_release+0x1e3/0x680 [ 802.541756] ? __pfx_lock_release+0x10/0x10 [ 802.542078] kernfs_new_node+0x97/0x120 [ 802.542381] __kernfs_create_file+0x55/0x350 [ 802.542714] sysfs_add_file_mode_ns+0x21c/0x440 [ 802.543059] ? __pfx_dev_attr_store+0x10/0x10 [ 802.543398] internal_create_group+0x322/0xb00 [ 802.543745] ? __pfx_internal_create_group+0x10/0x10 [ 802.544119] loop_configure+0xce5/0x1910 [ 802.544434] lo_ioctl+0x934/0x19a0 [ 802.544696] ? kmem_cache_free+0x10d/0x4d0 [ 802.544998] ? __x64_sys_openat+0x143/0x200 [ 802.545310] ? do_syscall_64+0x3f/0x90 [ 802.545594] ? __pfx_lo_ioctl+0x10/0x10 [ 802.545862] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 802.546246] ? __lock_acquire+0xc3f/0x6340 [ 802.546547] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 802.547014] ? __pfx_do_sys_openat2+0x10/0x10 [ 802.547328] ? __pfx_lo_ioctl+0x10/0x10 [ 802.547635] blkdev_ioctl+0x2e4/0x750 [ 802.547909] ? __pfx_blkdev_ioctl+0x10/0x10 [ 802.548240] ? selinux_file_ioctl+0xba/0x270 [ 802.548579] ? __pfx_blkdev_ioctl+0x10/0x10 [ 802.548914] __x64_sys_ioctl+0x1a4/0x210 [ 802.549222] do_syscall_64+0x3f/0x90 [ 802.549496] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 802.549855] RIP: 0033:0x7ffac4fc28d7 [ 802.550127] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 802.551325] RSP: 002b:00007ffac2537f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 802.551854] RAX: ffffffffffffffda RBX: 00007ffac500c970 RCX: 00007ffac4fc28d7 [ 802.552358] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 802.552836] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 802.553311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 802.553795] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 802.554267] [ 802.576275] loop4: detected capacity change from 0 to 512 [ 802.582362] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 802.583061] EXT4-fs (loop4): group descriptors corrupted! 10:33:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 27) 10:33:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:33:13 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(0x0, r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:33:13 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r2, 0x540a, 0x2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:33:13 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f"], 0x82) 10:33:13 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) 10:33:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 26) 10:33:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd}, 0x9, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 816.956304] loop4: detected capacity change from 0 to 512 10:33:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x6, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) [ 816.975060] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 816.976512] EXT4-fs (loop4): group descriptors corrupted! [ 816.985923] syz-executor.7: attempt to access beyond end of device [ 816.985923] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 816.995796] EXT4-fs (loop7): unable to read superblock 10:33:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:33:25 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r2, 0x540a, 0x2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:33:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0x6e, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e"}, 0x77, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:33:25 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x0, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:33:25 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 27) 10:33:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x7, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) 10:33:25 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(0x0, r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:33:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 28) [ 828.435974] loop4: detected capacity change from 0 to 512 [ 828.442853] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 828.443626] EXT4-fs (loop4): group descriptors corrupted! 10:33:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) [ 828.474674] syz-executor.7: attempt to access beyond end of device [ 828.474674] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 828.486401] EXT4-fs (loop7): unable to read superblock 10:33:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 29) 10:33:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0x6e, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e"}, 0x77, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 828.541800] loop4: detected capacity change from 0 to 512 10:33:25 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 28) [ 828.548290] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 828.548907] EXT4-fs (loop4): group descriptors corrupted! 10:33:25 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(0x0, r2) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r3, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) [ 828.601107] syz-executor.7: attempt to access beyond end of device [ 828.601107] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 828.607162] EXT4-fs (loop7): unable to read superblock 10:33:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 30) 10:33:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0x6e, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e"}, 0x77, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) [ 828.632683] loop4: detected capacity change from 0 to 512 10:33:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x18, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) [ 828.643838] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 828.644614] EXT4-fs (loop4): group descriptors corrupted! 10:33:25 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 29) 10:33:25 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r2, 0x540a, 0x2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:33:25 executing program 5: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="04227f09", @ANYRES64], 0x82) 10:33:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', 0x0, &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xdb, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395362befd4685bb8bfd72f63c4a23eb6fa8d9ac33a5ec4709f3b8b6010e061d5844737e2c1cc2c6c259b61739792f30196021c02f0c077"}, 0xe4, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:33:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 31) [ 828.717617] FAULT_INJECTION: forcing a failure. [ 828.717617] name failslab, interval 1, probability 0, space 0, times 0 [ 828.718462] CPU: 1 PID: 7012 Comm: syz-executor.7 Not tainted 6.5.0-rc4-next-20230731 #1 [ 828.718993] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 828.719536] Call Trace: [ 828.719717] [ 828.719900] dump_stack_lvl+0xc1/0xf0 [ 828.720186] should_fail_ex+0x4b4/0x5b0 [ 828.720475] ? __kernfs_new_node+0xd4/0x890 [ 828.720785] should_failslab+0x9/0x20 [ 828.721059] kmem_cache_alloc+0x61/0x390 [ 828.721351] __kernfs_new_node+0xd4/0x890 [ 828.721649] ? __pfx___kernfs_new_node+0x10/0x10 [ 828.721988] ? down_write+0x11a/0x1f0 [ 828.722273] ? up_write+0x196/0x510 [ 828.722534] kernfs_new_node+0x97/0x120 [ 828.722805] __kernfs_create_file+0x55/0x350 [ 828.723129] sysfs_add_file_mode_ns+0x21c/0x440 [ 828.723454] ? __pfx_dev_attr_store+0x10/0x10 [ 828.723763] internal_create_group+0x322/0xb00 [ 828.724088] ? __pfx_internal_create_group+0x10/0x10 [ 828.724451] loop_configure+0xce5/0x1910 [ 828.724766] lo_ioctl+0x934/0x19a0 [ 828.725022] ? __x64_sys_openat+0x143/0x200 [ 828.725325] ? do_syscall_64+0x3f/0x90 [ 828.725605] ? __pfx_lo_ioctl+0x10/0x10 [ 828.725882] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 828.726225] ? __pfx_perf_tp_event+0x10/0x10 [ 828.726531] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 828.726897] ? __lock_acquire+0xc3f/0x6340 [ 828.727211] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 828.727667] ? perf_trace_preemptirq_template+0x252/0x420 [ 828.728061] ? __pfx_lo_ioctl+0x10/0x10 [ 828.728356] blkdev_ioctl+0x2e4/0x750 [ 828.728658] ? __pfx_blkdev_ioctl+0x10/0x10 [ 828.728972] ? selinux_file_ioctl+0xba/0x270 [ 828.729305] ? __pfx_blkdev_ioctl+0x10/0x10 [ 828.729623] __x64_sys_ioctl+0x1a4/0x210 [ 828.729928] do_syscall_64+0x3f/0x90 [ 828.730201] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 828.730586] RIP: 0033:0x7f0da2a8d8d7 [ 828.730861] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 828.732101] RSP: 002b:00007f0da0002f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 828.732645] RAX: ffffffffffffffda RBX: 00007f0da2ad7970 RCX: 00007f0da2a8d8d7 [ 828.733137] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 828.733641] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 828.734137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 828.734634] R13: 0000000000000005 R14: 0000000020000240 R15: 0000000000000000 [ 828.735158] [ 828.754414] loop4: detected capacity change from 0 to 512 [ 828.761027] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 828.761808] EXT4-fs (loop4): group descriptors corrupted! 10:33:25 executing program 5: ptrace$cont(0x6c15c14a5c2c2df0, 0x0, 0x40, 0xfffffffffffffffb) prctl$PR_SET_FP_MODE(0x2d, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[], 0x82) syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@any, "d642879f4903207f"}}}, 0x11) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_si_security={{0x2, 0x7}, {0x20, 0x3ff, 0x7, 0x8}}}, 0xa) syz_emit_vhci(&(0x7f0000000080)=@HCI_VENDOR_PKT, 0x2) syz_emit_vhci(&(0x7f00000000c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_keypress_notify={{0x3c, 0x7}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0xfd}}}, 0xa) [ 828.791445] syz-executor.7: attempt to access beyond end of device [ 828.791445] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 828.792799] EXT4-fs (loop7): unable to read superblock [ 828.797933] Bluetooth: hci4: Malformed Event: 0x02 [ 828.798774] Bluetooth: hci4: Malformed Event: 0x02 [ 828.799562] Bluetooth: hci4: Malformed Event: 0x02 [ 828.826378] loop3: detected capacity change from 0 to 1 [ 828.833102] EXT4-fs: Ignoring removed orlov option [ 828.838956] EXT4-fs (loop3): unable to read superblock 10:33:37 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000180)=0x5ccd250e) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r2, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:33:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) setxattr$security_evm(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400), &(0x7f0000001ac0)=@v2={0x5, 0x1, 0x14, 0xfffffffd, 0xa5, "de4b317773fdb16a33cb16e988b71ebda69a50891c9d3b7a62726a6ba63b2fe9d8856b1f6e1736ecbdd1af42c3b24cc81e2140b822e1e0b4e10075360d06eed67442b1780177b2151b839ba9277910edc4c5f13f90433614e8336b2988d744bc1cd25a5ddca9d930fa1f2954da9e4aa814c72a0e2a67ac5158854c962df4591abb07c5395d3e52489b9dd74bbd7cdb9b2c26e721272914e12a1fd7bfa787156843340d0395"}, 0xae, 0x2) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="86541a384075ab7a4b7cec80d91700000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x140}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000001740)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/135, 0x87}, {&(0x7f0000001600)=""/99, 0x63}, {&(0x7f0000001680)=""/137, 0x89}], 0x4, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x40}}], 0x2, 0x40002026, &(0x7f0000001880)={r0, r1+10000000}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="3f17fc21345da7a440daf9a1bdac276b85c2d6463351eae513dd8b81a5f083cf9b028536b70bba19dc612008c58658b6db3a4a24a081cafa33f1d574be9eab68bb853b79a36c7f63d49e71bcbded12c7d7a5f5c07d1a5feb63fc6380aa15231fa67208bf8291ba24d643de38104a4cd524598a700928de4290b1617d1a14b4ca03c32a40bde8202e112d5b6fe3bd12fef3e6c71bb19cf80b386e986d2e8ade2495c8c508e31575", 0xa7, 0x9}], 0x10000, &(0x7f00000018c0)={[{@resgid={'resgid', 0x3d, r2}}, {@orlov}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}]}) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) 10:33:37 executing program 3: ptrace$cont(0x6c15c14a5c2c2df0, 0x0, 0x40, 0xfffffffffffffffb) prctl$PR_SET_FP_MODE(0x2d, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[], 0x82) syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@any, "d642879f4903207f"}}}, 0x11) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_si_security={{0x2, 0x7}, {0x20, 0x3ff, 0x7, 0x8}}}, 0xa) syz_emit_vhci(&(0x7f0000000080)=@HCI_VENDOR_PKT, 0x2) syz_emit_vhci(&(0x7f00000000c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_keypress_notify={{0x3c, 0x7}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0xfd}}}, 0xa) 10:33:37 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000100)={0x0, 0x6, 0x20, 0x9, 0x1b, "9639a135441e912bcda390f899aa5ca891bcd7", 0x2800000, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') ioctl$TCXONC(r2, 0x540a, 0x2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x34, r4, 0x401, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) 10:33:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x64, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) 10:33:37 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000018c0)) (fail_nth: 30) 10:33:37 executing program 5: syz_emit_vhci(&(0x7f0000000600)=ANY=[@ANYBLOB="04227f09"], 0x82) syz_emit_vhci(&(0x7f0000000280)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f00000001c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0x85}, @l2cap_cid_signaling={{0x81}, [@l2cap_conf_req={{0x4, 0x7f, 0x40}, {0xd27d, 0x0, [@l2cap_conf_mtu={0x1, 0x2, 0x5}, @l2cap_conf_efs={0x6, 0x10, {0x0, 0x2, 0x8, 0x8001, 0x7, 0x7}}, @l2cap_conf_mtu={0x1, 0x2, 0x5e}, @l2cap_conf_rfc={0x4, 0x9, {0x4, 0x9, 0x1, 0xe681, 0x3, 0x101}}, @l2cap_conf_flushto={0x2, 0x2, 0xfc01}, @l2cap_conf_ews={0x7, 0x2, 0x3ff}, @l2cap_conf_rfc={0x4, 0x9, {0x0, 0x8, 0x1, 0x9, 0x400, 0x1000}}, @l2cap_conf_ews={0x7, 0x2, 0x6}]}}, @l2cap_create_chan_req={{0xc, 0xcc, 0x5}, {0x9, 0x8, 0x4}}, @l2cap_conf_rsp={{0x5, 0x5, 0x1c}, {0xfff, 0x401, 0x1000, [@l2cap_conf_mtu={0x1, 0x2, 0x1}, @l2cap_conf_efs={0x6, 0x10, {0x6, 0x2, 0xf493, 0x9, 0xff, 0x7ff}}]}}, @l2cap_disconn_rsp={{0x7, 0x81, 0x4}, {0x3f, 0x9}}, @l2cap_conn_rsp={{0x3, 0x0, 0x8}, {0x4, 0x58d, 0x9, 0x1ff}}]}}, 0x8a) syz_emit_vhci(&(0x7f0000000180)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x2, 0x0, 0x10}, @l2cap_cid_le_signaling={{0xc}, @l2cap_conn_param_update_req={{0x12, 0x1, 0x8}, {0x6, 0x1e, 0x80, 0x6}}}}, 0x15) syz_emit_vhci(&(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) 10:33:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0300000004", 0x47, 0x7ff}], 0x0, &(0x7f0000012800)=ANY=[]) (fail_nth: 32) [ 840.443102] FAULT_INJECTION: forcing a failure. [ 840.443102] name failslab, interval 1, probability 0, space 0, times 0 [ 840.443928] CPU: 1 PID: 7052 Comm: syz-executor.4 Not tainted 6.5.0-rc4-next-20230731 #1 [ 840.444465] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 840.445018] Call Trace: [ 840.445199] [ 840.445362] dump_stack_lvl+0xc1/0xf0 [ 840.445648] should_fail_ex+0x4b4/0x5b0 [ 840.445931] ? __kernfs_new_node+0xd4/0x890 [ 840.446236] should_failslab+0x9/0x20 [ 840.446506] kmem_cache_alloc+0x61/0x390 [ 840.446797] __kernfs_new_node+0xd4/0x890 [ 840.447097] ? __pfx___kernfs_new_node+0x10/0x10 [ 840.447438] ? down_write+0x11a/0x1f0 [ 840.447727] ? up_write+0x196/0x510 [ 840.447998] kernfs_new_node+0x97/0x120 [ 840.448278] __kernfs_create_file+0x55/0x350 [ 840.448589] sysfs_add_file_mode_ns+0x21c/0x440 [ 840.448933] ? __pfx_dev_attr_store+0x10/0x10 [ 840.449248] internal_create_group+0x322/0xb00 [ 840.449577] ? __pfx_internal_create_group+0x10/0x10 [ 840.449937] loop_configure+0xce5/0x1910 [ 840.450237] lo_ioctl+0x934/0x19a0 [ 840.450492] ? kmem_cache_free+0x10d/0x4d0 [ 840.450789] ? __x64_sys_openat+0x143/0x200 [ 840.451098] ? do_syscall_64+0x3f/0x90 [ 840.451385] ? __pfx_lo_ioctl+0x10/0x10 [ 840.451667] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 840.452022] ? __lock_acquire+0xc3f/0x6340 [ 840.452322] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 840.452758] ? __pfx_do_sys_openat2+0x10/0x10 [ 840.453079] ? __pfx_lo_ioctl+0x10/0x10 [ 840.453359] blkdev_ioctl+0x2e4/0x750 [ 840.453634] ? __pfx_blkdev_ioctl+0x10/0x10 [ 840.453944] ? selinux_file_ioctl+0xba/0x270 [ 840.454259] ? __pfx_blkdev_ioctl+0x10/0x10 [ 840.454569] __x64_sys_ioctl+0x1a4/0x210 [ 840.454862] do_syscall_64+0x3f/0x90 [ 840.455136] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 840.455487] RIP: 0033:0x7ffac4fc28d7 [ 840.455739] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 840.456933] RSP: 002b:00007ffac2537f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 840.457447] RAX: ffffffffffffffda RBX: 00007ffac500c970 RCX: 00007ffac4fc28d7 [ 840.457917] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 840.458390] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 840.458861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 840.459335] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 840.459826] [ 840.465231] Bluetooth: Wrong link type (-22) [ 840.465951] Bluetooth: Wrong link type (-22) [ 840.466787] Bluetooth: Wrong link type (-22) [ 840.467024] syz-executor.7: attempt to access beyond end of device [ 840.467024] loop7: rw=4096, sector=2, nr_sectors = 2 limit=0 [ 840.467580] Bluetooth: Wrong link type (-22) [ 840.469108] Bluetooth: hci4: link tx timeout [ 840.470167] Bluetooth: hci4: killing stalled connection 11:aa:aa:aa:aa:aa [ 840.471197] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580 [ 840.472175] EXT4-fs (loop7): unable to read superblock [ 840.472280] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 285, name: kworker/u5:2 [ 840.474708] preempt_count: 0, expected: 0 [ 840.475456] RCU nest depth: 1, expected: 0 [ 840.476016] 3 locks held by kworker/u5:2/285: [ 840.476663] #0: ffff88800fe24938 ((wq_completion)hci4#2){+.+.}-{0:0}, at: process_one_work+0x99d/0x1770 [ 840.477985] #1: ffff888040bb7d90 ((work_completion)(&hdev->tx_work)){+.+.}-{0:0}, at: process_one_work+0x9d0/0x1770 [ 840.479494] #2: ffffffff8560c4a0 (rcu_read_lock){....}-{1:2}, at: __check_timeout+0x171/0x480 [ 840.480717] CPU: 0 PID: 285 Comm: kworker/u5:2 Not tainted 6.5.0-rc4-next-20230731 #1 [ 840.481721] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 840.482768] Workqueue: hci4 hci_tx_work [ 840.486385] Call Trace: [ 840.486742] [ 840.487065] dump_stack_lvl+0xc1/0xf0 [ 840.487623] __might_resched+0x2f9/0x510 [ 840.488198] __mutex_lock+0x9e/0x1a30 [ 840.488767] ? irq_work_queue+0x2d/0x80 [ 840.489327] ? vprintk_emit+0x107/0x580 [ 840.489893] ? hci_cmd_sync_submit+0x3b/0x2d0 [ 840.490534] ? __pfx___mutex_lock+0x10/0x10 [ 840.491137] ? vprintk+0x82/0x90 [ 840.491632] ? _printk+0xbf/0x100 [ 840.492131] ? __pfx__printk+0x10/0x10 [ 840.492700] ? __pfx_abort_conn_sync+0x10/0x10 [ 840.493338] hci_cmd_sync_submit+0x3b/0x2d0 [ 840.493948] ? __pfx_abort_conn_sync+0x10/0x10 [ 840.494580] hci_cmd_sync_queue+0x7b/0xb0 [ 840.495165] hci_disconnect+0x1c2/0x450 [ 840.495708] ? __pfx_hci_disconnect+0x10/0x10 [ 840.496324] ? __pfx_lock_release+0x10/0x10 [ 840.496673] loop4: detected capacity change from 0 to 512 [ 840.496947] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 840.498012] __check_timeout+0x2cc/0x480 [ 840.498570] hci_tx_work+0x7cb/0x1a70 [ 840.499104] ? pwq_activate_inactive_work+0x298/0x550 [ 840.499798] ? __pfx_hci_tx_work+0x10/0x10 [ 840.500391] process_one_work+0xabf/0x1770 [ 840.500994] ? __pfx_lock_acquire+0x10/0x10 [ 840.501578] ? __pfx_process_one_work+0x10/0x10 [ 840.502224] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 840.502879] worker_thread+0x64f/0x12a0 [ 840.503466] ? __pfx_worker_thread+0x10/0x10 [ 840.504098] kthread+0x33f/0x440 [ 840.504580] ? __pfx_kthread+0x10/0x10 [ 840.505157] ret_from_fork+0x2f/0x70 [ 840.505681] ? __pfx_kthread+0x10/0x10 [ 840.506231] ret_from_fork_asm+0x1b/0x30 [ 840.506831] [ 840.507276] Bluetooth: hci5: Malformed Event: 0x02 [ 840.507330] [ 840.507891] ============================= [ 840.508434] [ BUG: Invalid wait context ] [ 840.508980] 6.5.0-rc4-next-20230731 #1 Tainted: G W [ 840.509812] ----------------------------- [ 840.510362] kworker/u5:2/285 is trying to lock: [ 840.510983] ffff88803a6209b0 (&hdev->unregister_lock){+.+.}-{3:3}, at: hci_cmd_sync_submit+0x3b/0x2d0 [ 840.512251] other info that might help us debug this: [ 840.512933] context-{4:4} [ 840.513302] 3 locks held by kworker/u5:2/285: [ 840.513896] #0: ffff88800fe24938 ((wq_completion)hci4#2){+.+.}-{0:0}, at: process_one_work+0x99d/0x1770 [ 840.515230] #1: ffff888040bb7d90 ((work_completion)(&hdev->tx_work)){+.+.}-{0:0}, at: process_one_work+0x9d0/0x1770 [ 840.516669] #2: ffffffff8560c4a0 (rcu_read_lock){....}-{1:2}, at: __check_timeout+0x171/0x480 [ 840.517865] stack backtrace: [ 840.518285] CPU: 0 PID: 285 Comm: kworker/u5:2 Tainted: G W 6.5.0-rc4-next-20230731 #1 [ 840.519515] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 840.520596] Workqueue: hci4 hci_tx_work [ 840.521157] Call Trace: [ 840.521508] [ 840.521819] dump_stack_lvl+0x91/0xf0 [ 840.522360] __lock_acquire+0x1605/0x6340 [ 840.522937] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 840.523651] ? __pfx___lock_acquire+0x10/0x10 [ 840.524286] ? finish_task_switch.isra.0+0x203/0x830 [ 840.525012] ? __switch_to+0x5c6/0xeb0 [ 840.525555] ? __schedule+0x9b1/0x2b00 [ 840.526097] lock_acquire+0x19a/0x4c0 [ 840.526632] ? hci_cmd_sync_submit+0x3b/0x2d0 [ 840.527266] ? __pfx_lock_acquire+0x10/0x10 [ 840.527867] ? dump_stack_lvl+0xda/0xf0 [ 840.528426] ? dump_stack_lvl+0xdc/0xf0 [ 840.529016] __mutex_lock+0x12a/0x1a30 [ 840.529575] ? hci_cmd_sync_submit+0x3b/0x2d0 [ 840.530209] ? irq_work_queue+0x2d/0x80 [ 840.530764] ? vprintk_emit+0x107/0x580 [ 840.531329] ? hci_cmd_sync_submit+0x3b/0x2d0 [ 840.531965] ? __pfx___mutex_lock+0x10/0x10 [ 840.532559] ? vprintk+0x82/0x90 [ 840.533063] ? _printk+0xbf/0x100 [ 840.533554] ? __pfx__printk+0x10/0x10 [ 840.534115] ? __pfx_abort_conn_sync+0x10/0x10 [ 840.534752] hci_cmd_sync_submit+0x3b/0x2d0 [ 840.535357] ? __pfx_abort_conn_sync+0x10/0x10 [ 840.535996] hci_cmd_sync_queue+0x7b/0xb0 [ 840.536577] hci_disconnect+0x1c2/0x450 [ 840.537149] ? __pfx_hci_disconnect+0x10/0x10 [ 840.537777] ? __pfx_lock_release+0x10/0x10 [ 840.538376] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 840.539093] __check_timeout+0x2cc/0x480 [ 840.539661] hci_tx_work+0x7cb/0x1a70 [ 840.540209] ? pwq_activate_inactive_work+0x298/0x550 [ 840.540931] ? __pfx_hci_tx_work+0x10/0x10 [ 840.541522] process_one_work+0xabf/0x1770 [ 840.542124] ? __pfx_lock_acquire+0x10/0x10 [ 840.542725] ? __pfx_process_one_work+0x10/0x10 [ 840.543383] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 840.544046] worker_thread+0x64f/0x12a0 [ 840.544619] ? __pfx_worker_thread+0x10/0x10 [ 840.545267] kthread+0x33f/0x440 [ 840.545738] ? __pfx_kthread+0x10/0x10 [ 840.546280] ret_from_fork+0x2f/0x70 [ 840.546800] ? __pfx_kthread+0x10/0x10 [ 840.547340] ret_from_fork_asm+0x1b/0x30 [ 840.547920] 10:33:37 executing program 5: syz_emit_vhci(&(0x7f0000000000)=ANY=[], 0x82) syz_emit_vhci(&(0x7f0000000000)=@HCI_SCODATA_PKT={0x3, {0xc9, 0x7e}, "2dff5ae8261105ca497bc1e559aa8c26952b3f16d7a18b62e177aed3ddd0772aa761441aea5663264c53b7786f4fb103d609008f335a285e397ee6727a04fb8e862cc44c1bebd88ac915bec740d612ac7cfbeffdd2725819e00cd9b888664409090f2bea2bbd57f54e86715034fd7ba7adea44f7455872aac51553f3253b"}, 0x82) syz_emit_vhci(&(0x7f00000000c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) 10:33:37 executing program 3: ptrace$cont(0x6c15c14a5c2c2df0, 0x0, 0x40, 0xfffffffffffffffb) prctl$PR_SET_FP_MODE(0x2d, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[], 0x82) syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@any, "d642879f4903207f"}}}, 0x11) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_si_security={{0x2, 0x7}, {0x20, 0x3ff, 0x7, 0x8}}}, 0xa) syz_emit_vhci(&(0x7f0000000080)=@HCI_VENDOR_PKT, 0x2) syz_emit_vhci(&(0x7f00000000c0)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_keypress_notify={{0x3c, 0x7}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0xfd}}}, 0xa) [ 840.567160] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 67108864)! [ 840.567822] EXT4-fs (loop4): group descriptors corrupted! [ 840.581533] Bluetooth: hci5: Malformed Event: 0x02 [ 842.559285] Bluetooth: hci4: command 0x0406 tx timeout VM DIAGNOSIS: 10:33:38 Registers: info registers vcpu 0 RAX=0000000000000038 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff82563d35 RDI=ffffffff87eeede0 RBP=ffffffff87eeeda0 RSP=ffff888040bb7338 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000038 R11=0000000000000001 R12=0000000000000038 R13=ffffffff87eeeda0 R14=0000000000000010 R15=ffffffff82563d20 RIP=ffffffff82563d8d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f1348d95004 CR3=0000000015ff0000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=dffffc0000000000 RBX=0000000000000031 RCX=ffffffff87713aa8 RDX=1ffffffff0ee2755 RSI=0000000000000008 RDI=ffffffff8773bb00 RBP=ffff888015cf0000 RSP=ffff888032c5f8a8 R8 =0000000000000000 R9 =fffffbfff0ee7760 R10=ffffffff8773bb07 R11=0000000000000001 R12=ffff888015cf09f0 R13=0000000000004809 R14=0000000000000000 R15=0000000000000001 RIP=ffffffff812d9fff RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555556869400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f2688fd7eb0 CR3=0000000015c54000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000