0, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', 0x0, 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3f00, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:12:17 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x700, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:12:17 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), 0x0) 20:12:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', 0x0, 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:17 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:17 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:12:17 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1003) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:17 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r1, r2, 0x1000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) mount$9p_xen(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x81, &(0x7f00000000c0)={'trans=xen,', {[{@dfltgid={'dfltgid', 0x3d, r2}}, {@msize={'msize', 0x3d, 0x3}}], [{@uid_eq={'uid', 0x3d, r3}}]}}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:12:17 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2397.289822] loop1: detected capacity change from 0 to 33559552 20:12:17 executing program 3: stat(&(0x7f0000000180)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r0, r1, 0x100) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x400, 0x0, 0x0, 0x1, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2397.368701] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2397.368701] program syz-executor.1 not setting count and/or reply_len properly 20:12:17 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0189436, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:12:18 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:31 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x900, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:12:31 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc020660b, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:12:31 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:31 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1004) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:12:31 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:31 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 1) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:12:31 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2000000}}}, 0x108) getpeername(r1, &(0x7f0000000000)=@caif=@util, &(0x7f0000000080)=0x80) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4000000000000000, 0x94a21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x0, 0x3}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x81, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="6a6da0b60919291ce9a6cea5e9c36277f0920f262febb5010550cfd6fbf42c596d2d729c5b594b44000669fa3c9a2ef83c7e2800fc7438181e1d01ebc8578638d6e037084859dd9f93335a05a20634ca21909058092839d93c58b71ed7f16cff39ccd842407fc5cbe86133cd86327f81f45d53a78bf4d39299867391d79859a19bfcedc7343ef99f1e0d36c8a75a4c96a40afa29a4c29cf174620228ca33712f97848c386b42a3e8ef7a957c3b27c5", 0xaf, 0x3}], 0x40, &(0x7f0000000340)={[{@numtail}, {@shortname_win95}, {@shortname_mixed}], [{@fsname={'fsname', 0x3d, '%-[]'}}, {@euid_gt={'euid>', r2}}]}) [ 2410.953670] loop1: detected capacity change from 0 to 33559552 20:12:31 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x1}, 0x0, 0x400, 0xffffffffffffffff, 0x0) 20:12:31 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2411.067478] FAULT_INJECTION: forcing a failure. [ 2411.067478] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2411.070080] CPU: 1 PID: 13041 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2411.071597] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2411.073375] Call Trace: [ 2411.073940] dump_stack+0x107/0x167 [ 2411.074719] should_fail.cold+0x5/0xa [ 2411.075534] _copy_from_user+0x2e/0x1b0 [ 2411.076413] iovec_from_user+0x141/0x400 [ 2411.077278] __import_iovec+0x67/0x590 [ 2411.078106] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2411.079219] import_iovec+0x83/0xb0 [ 2411.080007] vfs_writev+0xc1/0x620 [ 2411.080763] ? vfs_iter_write+0xa0/0xa0 [ 2411.081608] ? __fget_files+0x2cf/0x520 [ 2411.082455] ? lock_downgrade+0x6d0/0x6d0 [ 2411.083332] ? find_held_lock+0x2c/0x110 [ 2411.084207] ? ksys_write+0x12d/0x260 [ 2411.085013] ? __fget_files+0x2f8/0x520 [ 2411.085858] ? __fget_light+0xea/0x290 [ 2411.086680] do_writev+0x139/0x300 [ 2411.087432] ? vfs_writev+0x620/0x620 [ 2411.088252] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2411.089366] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2411.090462] do_syscall_64+0x33/0x40 [ 2411.091255] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2411.092357] RIP: 0033:0x7f952207fb19 [ 2411.093150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2411.097086] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2411.098716] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2411.100256] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2411.101783] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2411.103322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2411.104843] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:12:31 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) getuid() lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) setresuid(r2, r0, r1) mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000080, &(0x7f00000000c0)={'trans=virtio,', {[{@cache_loose}, {@cache_fscache}, {@version_L}], [{@subj_role={'subj_role', 0x3d, '%*&.!\'[+'}}]}}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x94a21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x1, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:12:31 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:31 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1007) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:31 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:31 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 2) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:12:31 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481223, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:12:31 executing program 3: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) r2 = getuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x10800d7, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}], [{@measure}, {@fowner_gt={'fowner>', r0}}, {@uid_gt={'uid>', r2}}]}}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r3, &(0x7f0000000000)='./file0\x00', r4, &(0x7f0000000040)='./file0\x00') mount$9p_virtio(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x40000, &(0x7f0000000300)={'trans=virtio,', {[{@version_u}, {@debug={'debug', 0x3d, 0xffffffffffffff4b}}, {@cache_fscache}, {@access_client}, {@access_any}], [{@euid_gt={'euid>', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x36, 0x39, 0x39, 0x30, 0x37, 0x38, 0x61], 0x2d, [0x0, 0x37, 0x56, 0x64], 0x2d, [0x63, 0x65, 0x30, 0x62], 0x2d, [0x39, 0x62, 0x66, 0x31], 0x2d, [0x35, 0x30, 0x66, 0x30, 0x65, 0x62, 0x66, 0x31]}}}, {@fowner_gt={'fowner>', r0}}, {@audit}, {@audit}]}}) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x200000, 0x40) connect$unix(r3, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) r5 = accept(r4, 0x0, &(0x7f0000000400)) connect$unix(r5, &(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:12:31 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0xe00, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:12:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4800, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:12:31 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2411.420766] FAULT_INJECTION: forcing a failure. [ 2411.420766] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2411.422154] CPU: 0 PID: 13079 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2411.422945] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2411.423934] Call Trace: [ 2411.424250] dump_stack+0x107/0x167 [ 2411.424660] should_fail.cold+0x5/0xa [ 2411.425103] _copy_from_user+0x2e/0x1b0 [ 2411.425560] sg_write.part.0+0x1cf/0xaa0 [ 2411.426019] ? sg_new_write.isra.0+0x770/0x770 [ 2411.426540] ? lock_acquire+0x197/0x470 [ 2411.426993] ? find_held_lock+0x2c/0x110 [ 2411.427454] ? __might_fault+0xd3/0x180 [ 2411.427922] ? lock_downgrade+0x6d0/0x6d0 [ 2411.428402] ? _cond_resched+0x10/0x30 [ 2411.428848] ? inode_security+0x107/0x140 [ 2411.429368] ? avc_policy_seqno+0x9/0x70 [ 2411.429834] ? selinux_file_permission+0x92/0x520 [ 2411.430395] sg_write+0x87/0x120 [ 2411.430781] do_iter_write+0x4f0/0x700 [ 2411.431223] ? import_iovec+0x83/0xb0 [ 2411.431674] vfs_writev+0x1ae/0x620 [ 2411.432089] ? vfs_iter_write+0xa0/0xa0 [ 2411.432547] ? __fget_files+0x2cf/0x520 [ 2411.433003] ? lock_downgrade+0x6d0/0x6d0 [ 2411.433471] ? find_held_lock+0x2c/0x110 [ 2411.433943] ? ksys_write+0x12d/0x260 [ 2411.434379] ? __fget_files+0x2f8/0x520 [ 2411.434831] ? __fget_light+0xea/0x290 [ 2411.435271] do_writev+0x139/0x300 [ 2411.435695] ? vfs_writev+0x620/0x620 [ 2411.436130] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2411.436722] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2411.437315] do_syscall_64+0x33/0x40 [ 2411.437739] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2411.438319] RIP: 0033:0x7f952207fb19 [ 2411.438741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2411.440851] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2411.441718] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2411.442526] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000007 [ 2411.443335] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2411.444165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2411.444975] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:12:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4c00, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:12:43 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:43 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:12:43 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1048) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:43 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) setresuid(r2, r0, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6, 0x6, &(0x7f0000001340)=[{&(0x7f0000000080)="2aa033a31fa7d86d5ee256571cadfea38f9dcf920e78bdadac8006141ef0ecb708d8e37b559fa537251922963e5608e9611e01a10d880bb6cabeab101e54e0861dcd69e64c81da4afd5d72b41137682592c6f35d230dcaeb", 0x58, 0x8000}, {&(0x7f0000000100)="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", 0x1000, 0x857}, {&(0x7f0000001100)="6d492c9500fa2295fafadb645f62c25d0763bc4c72b83afa8186c360659bed6ed462b4330c864672c8cb05ba3b7ddb47fe0fa58aced339dfe3d9d5a8ede4812f1c955561a38d9c4c6780dc85cedeb3d103055cbc3b84df", 0x57, 0x4ec}, {&(0x7f0000001180)="721dffe5299ad053587f5dc20c40fb0abb9e86726fc0532d50d1a82e63fe71d58c6e7d7f2ea57f04cc72d66e178bf52e5f3256a9c07123667ce3c07a14ccf8126439aacacac4b9fb8372e64024076d789c81b632d1e0dfa0139c1f43539a41d47b8e3eb40fa450a70d28ef909ebbb208da24d4ecebbf79c9999b665e91814ebd89a01ebf6a37082de9aff75d8ce1c7ee9c4e5edd7f332b108846b590ad09501339ce938dfd5ce63a04b7112a79ff0c950e7433920f7e16ad", 0xb8, 0x5}, {&(0x7f0000001240)="ed", 0x1, 0x84d5}, {&(0x7f0000001280)="081578e323c7846eebb329b14d123f574e00cb9699d659e849b0054203c929c9124238baae60fe69fcda04833ba9b0fbba56d45b58a3038930c2e929127a95263548241474d602e34f3bd2b801e83d0324dc31caa95cc3414f253c9133adf5ea1a78102c71232bce9febe4afed0a18e95eadb6d6120a241a4ac816a7b3c675d698b0c7ff9889ecbf5fb7521c0cb934b02dc6d193c9602c5363abd55498d20f7d1aaca4d751", 0xa5, 0x1}], 0x4000, &(0x7f0000001400)={[{@map_normal}, {@map_off}, {@overriderock}, {@gid={'gid', 0x3d, r1}}], [{@hash}, {@smackfsdef={'smackfsdef', 0x3d, '!+&&-!('}}, {@dont_measure}, {@func={'func', 0x3d, 'MODULE_CHECK'}}]}) 20:12:44 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481225, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:12:44 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:44 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 3) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2423.592548] loop1: detected capacity change from 0 to 33559552 20:12:44 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x104c) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:12:44 executing program 3: sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x4044000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:12:44 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2423.741572] FAULT_INJECTION: forcing a failure. [ 2423.741572] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2423.743045] CPU: 0 PID: 13132 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2423.743846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2423.744799] Call Trace: [ 2423.745115] dump_stack+0x107/0x167 [ 2423.745540] should_fail.cold+0x5/0xa [ 2423.745992] _copy_from_user+0x2e/0x1b0 [ 2423.746466] sg_write.part.0+0x5f7/0xaa0 [ 2423.746934] ? sg_new_write.isra.0+0x770/0x770 [ 2423.747491] ? find_held_lock+0x2c/0x110 [ 2423.747971] ? __might_fault+0xd3/0x180 [ 2423.748512] ? lock_downgrade+0x6d0/0x6d0 [ 2423.749073] ? _cond_resched+0x10/0x30 [ 2423.749600] ? inode_security+0x107/0x140 [ 2423.750164] ? avc_policy_seqno+0x9/0x70 [ 2423.750709] ? selinux_file_permission+0x92/0x520 [ 2423.751362] sg_write+0x87/0x120 [ 2423.751823] do_iter_write+0x4f0/0x700 [ 2423.752349] ? import_iovec+0x83/0xb0 [ 2423.752878] vfs_writev+0x1ae/0x620 [ 2423.753314] ? vfs_iter_write+0xa0/0xa0 [ 2423.753770] ? __fget_files+0x2cf/0x520 [ 2423.754228] ? lock_downgrade+0x6d0/0x6d0 [ 2423.754701] ? find_held_lock+0x2c/0x110 [ 2423.755176] ? ksys_write+0x12d/0x260 [ 2423.755611] ? __fget_files+0x2f8/0x520 [ 2423.756093] ? __fget_light+0xea/0x290 [ 2423.756549] do_writev+0x139/0x300 [ 2423.756953] ? vfs_writev+0x620/0x620 [ 2423.757415] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2423.758018] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2423.758612] do_syscall_64+0x33/0x40 [ 2423.759049] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2423.759631] RIP: 0033:0x7f952207fb19 [ 2423.760074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2423.762196] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2423.763066] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2423.763905] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2423.764719] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2423.765542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2423.766368] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:12:44 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122a, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:13:00 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:13:00 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x2000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:13:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2000000}}}, 0x108) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x1, @empty, 0x2}, 0x1c) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:13:00 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1068) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x53ef, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:13:00 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:00 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122b, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:13:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x10000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2439.867996] loop1: detected capacity change from 0 to 33559552 20:13:00 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$vcsn(&(0x7f00000000c0), 0x1, 0x20040) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2000000}}}, 0x108) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@fragment={0x32, 0x0, 0x9, 0x1, 0x0, 0x10, 0x66}, 0x8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) statx(0xffffffffffffffff, 0x0, 0x0, 0x2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r2, r3, 0x1000) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, r1, r3}, 0xc) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:13:00 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x106c) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2440.015959] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2440.015959] program syz-executor.1 not setting count and/or reply_len properly [ 2440.027852] FAULT_INJECTION: forcing a failure. [ 2440.027852] name failslab, interval 1, probability 0, space 0, times 0 [ 2440.030491] CPU: 0 PID: 13182 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2440.031973] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2440.033768] Call Trace: [ 2440.034317] dump_stack+0x107/0x167 [ 2440.035100] should_fail.cold+0x5/0xa [ 2440.035950] ? sg_build_indirect.isra.0+0x94/0x710 [ 2440.036977] should_failslab+0x5/0x20 [ 2440.037802] __kmalloc+0x72/0x390 [ 2440.038551] sg_build_indirect.isra.0+0x94/0x710 [ 2440.039582] ? scsi_req_init+0x18/0xb0 [ 2440.040400] ? scsi_initialize_rq+0x16/0xb0 [ 2440.041306] sg_common_write.constprop.0+0x992/0x1a30 [ 2440.042429] ? sg_build_indirect.isra.0+0x710/0x710 [ 2440.043522] ? vprintk_func+0x93/0x140 [ 2440.044392] ? printk+0xba/0xf1 [ 2440.045112] ? record_print_text.cold+0x16/0x16 [ 2440.046139] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2440.047198] ? trace_hardirqs_on+0x5b/0x180 [ 2440.048122] sg_write.part.0+0x69e/0xaa0 [ 2440.049023] ? sg_new_write.isra.0+0x770/0x770 [ 2440.049986] ? find_held_lock+0x2c/0x110 [ 2440.050926] ? __might_fault+0xd3/0x180 [ 2440.051745] ? lock_downgrade+0x6d0/0x6d0 [ 2440.052689] ? _cond_resched+0x10/0x30 [ 2440.053537] ? inode_security+0x107/0x140 [ 2440.054433] ? avc_policy_seqno+0x9/0x70 [ 2440.055300] ? selinux_file_permission+0x92/0x520 [ 2440.056353] sg_write+0x87/0x120 [ 2440.057137] do_iter_write+0x4f0/0x700 [ 2440.057988] ? import_iovec+0x83/0xb0 [ 2440.058817] vfs_writev+0x1ae/0x620 [ 2440.059577] ? vfs_iter_write+0xa0/0xa0 [ 2440.060558] ? __fget_files+0x2cf/0x520 [ 2440.061418] ? lock_downgrade+0x6d0/0x6d0 [ 2440.062377] ? find_held_lock+0x2c/0x110 [ 2440.063319] ? ksys_write+0x12d/0x260 [ 2440.064146] ? __fget_files+0x2f8/0x520 [ 2440.065018] ? __fget_light+0xea/0x290 [ 2440.065937] do_writev+0x139/0x300 [ 2440.066718] ? vfs_writev+0x620/0x620 [ 2440.067566] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2440.068730] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2440.069850] do_syscall_64+0x33/0x40 [ 2440.070666] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2440.071830] RIP: 0033:0x7f952207fb19 [ 2440.072603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2440.076591] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2440.078132] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2440.079622] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2440.081098] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2440.082569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2440.084234] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:13:00 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:13:00 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122d, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:13:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x10000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:00 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x3800, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:13:00 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 5) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:13:00 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000000)=0x1000, 0x4) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @private0}, &(0x7f00000000c0)=0x1c) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 20:13:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6800, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:13:00 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2440.523064] loop1: detected capacity change from 0 to 33559552 20:13:01 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x10000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:01 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000000)=0x0) setreuid(0xee00, r2) setresuid(0xffffffffffffffff, r1, 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000, 0x8, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) setresuid(r0, r1, r3) 20:13:01 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122e, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:13:01 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1074) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2440.652616] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2440.652616] program syz-executor.1 not setting count and/or reply_len properly [ 2440.665268] FAULT_INJECTION: forcing a failure. [ 2440.665268] name failslab, interval 1, probability 0, space 0, times 0 [ 2440.667754] CPU: 0 PID: 13218 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2440.669280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2440.671048] Call Trace: [ 2440.671614] dump_stack+0x107/0x167 [ 2440.672426] should_fail.cold+0x5/0xa [ 2440.673251] ? create_object.isra.0+0x3a/0xa20 [ 2440.674248] should_failslab+0x5/0x20 [ 2440.675071] kmem_cache_alloc+0x5b/0x310 [ 2440.675940] create_object.isra.0+0x3a/0xa20 [ 2440.676933] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2440.678011] __kmalloc+0x16e/0x390 [ 2440.678774] sg_build_indirect.isra.0+0x94/0x710 [ 2440.679787] ? scsi_req_init+0x18/0xb0 [ 2440.681629] ? scsi_initialize_rq+0x16/0xb0 [ 2440.682536] sg_common_write.constprop.0+0x992/0x1a30 [ 2440.683609] ? sg_build_indirect.isra.0+0x710/0x710 [ 2440.684672] ? vprintk_func+0x93/0x140 [ 2440.685486] ? printk+0xba/0xf1 [ 2440.686168] ? record_print_text.cold+0x16/0x16 [ 2440.687140] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2440.688196] ? trace_hardirqs_on+0x5b/0x180 [ 2440.689095] sg_write.part.0+0x69e/0xaa0 [ 2440.689935] ? sg_new_write.isra.0+0x770/0x770 [ 2440.690891] ? find_held_lock+0x2c/0x110 [ 2440.691737] ? __might_fault+0xd3/0x180 [ 2440.692582] ? lock_downgrade+0x6d0/0x6d0 [ 2440.693456] ? _cond_resched+0x10/0x30 [ 2440.694259] ? inode_security+0x107/0x140 [ 2440.695113] ? avc_policy_seqno+0x9/0x70 [ 2440.695948] ? selinux_file_permission+0x92/0x520 [ 2440.696958] sg_write+0x87/0x120 [ 2440.697664] do_iter_write+0x4f0/0x700 [ 2440.698473] ? import_iovec+0x83/0xb0 [ 2440.699263] vfs_writev+0x1ae/0x620 [ 2440.700021] ? vfs_iter_write+0xa0/0xa0 [ 2440.700861] ? __fget_files+0x2cf/0x520 [ 2440.701682] ? lock_downgrade+0x6d0/0x6d0 [ 2440.702541] ? find_held_lock+0x2c/0x110 [ 2440.703392] ? ksys_write+0x12d/0x260 [ 2440.704203] ? __fget_files+0x2f8/0x520 [ 2440.705036] ? __fget_light+0xea/0x290 [ 2440.705848] do_writev+0x139/0x300 [ 2440.706589] ? vfs_writev+0x620/0x620 [ 2440.707378] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2440.708479] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2440.709542] do_syscall_64+0x33/0x40 [ 2440.710312] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2440.711366] RIP: 0033:0x7f952207fb19 [ 2440.712140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2440.715898] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2440.717466] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2440.718925] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2440.720403] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2440.721861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2440.723563] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:13:01 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:01 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0xa) 20:13:01 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x107a) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:01 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 6) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:13:01 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122f, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:13:01 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x0, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2441.044703] loop1: detected capacity change from 0 to 33559552 20:13:01 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000002, 0x13, 0xffffffffffffffff, 0x10000000) r4 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000080)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x100, &(0x7f0000000040)=[r4, 0xffffffffffffffff], 0x2, 0x0, 0x0, {0x0, r5}}, 0x9) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2441.155837] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2441.155837] program syz-executor.1 not setting count and/or reply_len properly [ 2441.159217] FAULT_INJECTION: forcing a failure. [ 2441.159217] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 2441.161634] CPU: 1 PID: 13259 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2441.163069] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2441.164739] Call Trace: [ 2441.165281] dump_stack+0x107/0x167 [ 2441.166023] should_fail.cold+0x5/0xa [ 2441.166796] ? find_held_lock+0x2c/0x110 [ 2441.167627] __alloc_pages_nodemask+0x182/0x600 [ 2441.168574] ? __kmalloc+0x16e/0x390 [ 2441.169343] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2441.170584] ? trace_hardirqs_on+0x5b/0x180 [ 2441.171470] alloc_pages_current+0x187/0x280 [ 2441.172400] sg_build_indirect.isra.0+0x2f5/0x710 [ 2441.173387] sg_common_write.constprop.0+0x992/0x1a30 [ 2441.174462] ? sg_build_indirect.isra.0+0x710/0x710 [ 2441.175490] ? vprintk_func+0x93/0x140 [ 2441.176302] ? printk+0xba/0xf1 [ 2441.176981] ? record_print_text.cold+0x16/0x16 [ 2441.177943] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2441.178979] ? trace_hardirqs_on+0x5b/0x180 [ 2441.179877] sg_write.part.0+0x69e/0xaa0 [ 2441.180727] ? sg_new_write.isra.0+0x770/0x770 [ 2441.181670] ? find_held_lock+0x2c/0x110 [ 2441.182525] ? __might_fault+0xd3/0x180 [ 2441.183339] ? lock_downgrade+0x6d0/0x6d0 [ 2441.184228] ? _cond_resched+0x10/0x30 [ 2441.185028] ? inode_security+0x107/0x140 [ 2441.185878] ? avc_policy_seqno+0x9/0x70 [ 2441.186728] ? selinux_file_permission+0x92/0x520 [ 2441.187702] sg_write+0x87/0x120 [ 2441.188387] do_iter_write+0x4f0/0x700 [ 2441.189164] ? import_iovec+0x83/0xb0 [ 2441.189924] vfs_writev+0x1ae/0x620 [ 2441.190650] ? vfs_iter_write+0xa0/0xa0 [ 2441.191440] ? __fget_files+0x2cf/0x520 [ 2441.192240] ? lock_downgrade+0x6d0/0x6d0 [ 2441.193052] ? find_held_lock+0x2c/0x110 [ 2441.193872] ? ksys_write+0x12d/0x260 [ 2441.194641] ? __fget_files+0x2f8/0x520 [ 2441.195431] ? __fget_light+0xea/0x290 [ 2441.196244] do_writev+0x139/0x300 [ 2441.196965] ? vfs_writev+0x620/0x620 [ 2441.197738] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2441.198780] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2441.199829] do_syscall_64+0x33/0x40 [ 2441.200598] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2441.201639] RIP: 0033:0x7f952207fb19 [ 2441.202389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2441.206105] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2441.207702] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2441.209162] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2441.210607] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2441.212053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2441.213496] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:13:15 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x3900, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:13:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6c00, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:13:15 executing program 3: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x91, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ce09, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2400, 0x0, 0x0, 0x0, 0x192498f3, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 20:13:15 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481230, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:13:15 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x0, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:15 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x4000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 7) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2455.322246] loop1: detected capacity change from 0 to 33559552 20:13:15 executing program 3: stat(&(0x7f0000000000)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2455.451266] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2455.451266] program syz-executor.1 not setting count and/or reply_len properly [ 2455.455201] FAULT_INJECTION: forcing a failure. [ 2455.455201] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2455.456594] CPU: 0 PID: 13304 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2455.457393] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2455.458454] Call Trace: [ 2455.458830] dump_stack+0x107/0x167 [ 2455.459332] should_fail.cold+0x5/0xa [ 2455.459853] __alloc_pages_nodemask+0x182/0x600 [ 2455.460497] ? __kmalloc+0x16e/0x390 [ 2455.461000] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2455.461792] ? trace_hardirqs_on+0x5b/0x180 [ 2455.462348] alloc_pages_current+0x187/0x280 [ 2455.462938] sg_build_indirect.isra.0+0x2f5/0x710 [ 2455.463599] sg_common_write.constprop.0+0x992/0x1a30 [ 2455.464322] ? sg_build_indirect.isra.0+0x710/0x710 [ 2455.464994] ? vprintk_func+0x93/0x140 [ 2455.465519] ? printk+0xba/0xf1 [ 2455.465971] ? record_print_text.cold+0x16/0x16 [ 2455.466603] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2455.467277] ? trace_hardirqs_on+0x5b/0x180 [ 2455.467839] sg_write.part.0+0x69e/0xaa0 [ 2455.468375] ? sg_new_write.isra.0+0x770/0x770 [ 2455.468965] ? find_held_lock+0x2c/0x110 [ 2455.469486] ? __might_fault+0xd3/0x180 [ 2455.469943] ? lock_downgrade+0x6d0/0x6d0 [ 2455.470428] ? _cond_resched+0x10/0x30 [ 2455.470877] ? inode_security+0x107/0x140 [ 2455.471357] ? avc_policy_seqno+0x9/0x70 [ 2455.471819] ? selinux_file_permission+0x92/0x520 [ 2455.472384] sg_write+0x87/0x120 [ 2455.472780] do_iter_write+0x4f0/0x700 [ 2455.473226] ? import_iovec+0x83/0xb0 [ 2455.473662] vfs_writev+0x1ae/0x620 [ 2455.474080] ? vfs_iter_write+0xa0/0xa0 [ 2455.474532] ? __fget_files+0x2cf/0x520 [ 2455.474987] ? lock_downgrade+0x6d0/0x6d0 [ 2455.475457] ? find_held_lock+0x2c/0x110 [ 2455.475922] ? ksys_write+0x12d/0x260 [ 2455.476377] ? __fget_files+0x2f8/0x520 [ 2455.476880] ? __fget_light+0xea/0x290 [ 2455.477474] do_writev+0x139/0x300 [ 2455.477957] ? vfs_writev+0x620/0x620 [ 2455.478482] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2455.479203] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2455.479910] do_syscall_64+0x33/0x40 [ 2455.480436] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2455.481139] RIP: 0033:0x7f952207fb19 [ 2455.481653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2455.484157] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2455.485209] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2455.486182] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2455.487158] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2455.488125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2455.489106] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:13:16 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481258, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:13:16 executing program 3: stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x12002, 0x40, 0x1c}, 0x18) r2 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='.\x00', &(0x7f0000000100), 0x1000080, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e6f3da81110e0650b67a0d3cfc3f8c40231c2e98d706888a6a6c43b0fb603903cc73c5047c996fa8afa9ebd4fef76282c5ea010104263275e80f9e936e9b79a22b4012f9e2e8b22815794b1304a46075495f315b91235abb245de52bd254ebd77734917958fd6b784d547ae86d15e1442b2ea82fcc1e5f6883a8729602b6de0b0ca2e8aa760daf419bfb95a950e9c5389ddfa77b9c87380e925bed993497f788114b776b63eeb131f6ded5e4078b3f110f7df74f4921bfc1ebcf8ce03932113f773e92d17ee091232b048009600971d125e9b71e7edc7e7c78a012996482ed9f0194282e2c8d45be8a9c5b29fcace", @ANYRESHEX=r2, @ANYBLOB=',debug=0x0000000100000001,noextend,version=9p2000.L,nodevmap,dfltuid=', @ANYRESHEX=r0, @ANYBLOB=',version=9p2000.u,dont_appraise,\x00']) 20:13:16 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f00000003c0)='./file1\x00', 0x1, 0x4, &(0x7f0000000540)=[{&(0x7f0000001900)="d2911b4676a98b2e25bfc170e17d753042d682075b2b61d561abb1b5afe6ef54699a8b691a627fd501882f7765392a1b69db23029f46682b251294449d4d0ef052f87124b224ac6bdfd68af52e0b21cbfc6a396133aeaee2acd2158586f976f7ea70789beee0a3578ed41e7fdb2638805e7ed6cf8f2e94b42f4d621fdeda005784a1f85d4decb86b4418979c9fb3965ff20208760d45004854dfb2690f028bbb18abec3b3195d5641b8cf17f1953ef60a500c714cf755c04982e83d55bd4a8bc7a14731738bbbbdec57e3d1f711cd611cf72f585a987f0896d95d61496a8e96cc546", 0xe2, 0x7f}, {&(0x7f0000000400)="39c9c121f14f6b02c5a8da258a5fec2b8d329d418b28699ea894c0ac6079b815babf235fdc6771e24a10deab0413b1075e9aa8a40d93bdfc2be1", 0x3a, 0xfff}, {&(0x7f0000001a00)="d8e2276f720fb4ea9c0d486b9eea534681da5ff5fdf6c2dc891ca341bdabd66bf565a98ac28f94da907ea8039f9a8e50d7eee54365bc2037f00c8609403c3b5e7cd9c961facfd4a40bed3476e4d7634eeeeacc2f67d0abc5aa3e86bab53f1a952d37e5f8cd07e8665a720f03c7e33660800129d6fd4aa4a2e88a1a1588490b694a27d77915aa45f4a677488ce03ddb12066f8199c0152e7f476600f879dc0fe249a65071bb6c65b2ad42490613037dfc8c57e682ba427d64d17d9b2c6ef47e16f66b1291b393ca8a57afab46e3369412fdbee4f7524b359665", 0xd9}, {&(0x7f0000000440)="94a5b1cc343a402adb39348165e7a14c7fac026a6aa28b9f", 0x18, 0x6}], 0x0, &(0x7f0000001b00)={[{@uni_xlateno}, {@utf8no}, {@utf8no}, {@shortname_mixed}, {@uni_xlateno}, {@shortname_lower}, {@uni_xlateno}, {@shortname_lower}, {@utf8}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ext3\x00'}}, {@subj_user={'subj_user', 0x3d, ',-{,-'}}, {@euid_gt}]}) r1 = syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)=ANY=[@ANYBLOB='grpjquota=./file0,uid>', @ANYRESDEC=0x0, @ANYBLOB]) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2000000}}}, 0x108) connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e20, 0x6, @mcast1, 0x10001}, 0x1c) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r1, 0xf504, 0x0) 20:13:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7400, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:13:16 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x0, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:16 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481263, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2455.755357] 9pnet: Insufficient options for proto=fd [ 2455.758703] loop2: detected capacity change from 0 to 7680 [ 2455.766202] FAT-fs (loop2): Unrecognized mount option "smackfstransmute=ext3" or missing value [ 2455.890584] loop2: detected capacity change from 0 to 7680 [ 2455.911408] FAT-fs (loop2): Unrecognized mount option "smackfstransmute=ext3" or missing value 20:13:32 executing program 3: setresuid(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', 0x0, r0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:13:32 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x3f00, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:13:32 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x0, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:32 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:32 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481264, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:13:32 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="32cb55"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000001c00)='sockfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = geteuid() syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000340)='./file0\x00', 0x6, 0x6, &(0x7f0000001a80)=[{&(0x7f00000003c0)="582d5f7a01a6dbcf06ee335354d7180472851a1b052953ac41443d681897da02c7e73e76c8267dfb50fb455b755cfa7ee725d363d9a89e0ea83b0dd4729888f569f0619e5d433d5d379a980a0d6dc6854cb657800a7a2cef0d418ae20be3cca422781e376875c3e5cb1718e9f32e102b29c08b6280f2470d102bd4a1a5d4aac65118439ef78a5ff00f8b685f0605e4e0ea48486722edf47ce1aafac48ddc7957c7122c9e2fc78903c505cb2d0921414f98e00967059601", 0xb7, 0x4}, {&(0x7f0000000540)="372b4fd4fe0ed6008742cc63027abf2aa1c367d9e3068b7f3358cf1735a25d10061a5ffafe25df450d87d2782de5c855a3375eaf663c2f5211d1459207521d684a915f78779af6f4fc3f32c1df0aceed9ca977f4db0540e40989f00d15ed37fb0c89ace3ab88ee9ba62c0acf52176b2fa52a9993ab4206ff7e13496f503aeece36f7bb96b5db85edb09a1f0aa5237ab7513fa1eec5573bced9ee5a3a86ed50106f52cedaec73a8c5397364100c21f71e7d042d", 0xb3, 0xffff}, {&(0x7f0000000800)="a63ac0636a96a26a6dc1cec4c6b1d5802389fb31178799eb4aa94c9b760dbdaa9ad9be920796277d9c07ac48ca6289c20cdd14e72f39fad6463a99389d325274af0a12605a6a66646d2f8781b58afab837132310d0553a0abff4", 0x5a, 0x6}, {&(0x7f0000001e00)="14eae01dfb1d80eaba2f8526a3a980cc5c3c51afee498e8127ea1c6c63e3a09aaedc789c305685d17130d2e6114de1027095380909f7d8e4eed0055b3ce8e71fec4b31e4d50104f7558614b96e4a7743d109e8fa359dafbb71df9fad7c0d092773a9a4bcc9ed115ba196572613436a704011d0bdd0ef91af5f57088a47f57d425538326ea96d0069c6fd169ddfdc8e8edac46815e2d8e9f5f29dfc727ab7a27825b8d22045ec6cb577901c7eca7ea5b61c97bae251bc76cd46696cd36eece254952283278178fb89a8ec89f9ada855b5a8478518534c7efda682d937d7a413a417c1e08c52b2190eaeb05d1e69496a5ea338228b842af1c6ed22cf8fc6b5ce5adde7ced6216e7ea9b77ea440c8aa792d1e19cec0084465e70da82301084da4445939b6a97601752db1ee731f3169afcea4cf1dc8341060ecd60731c5c1f21c445d24cc6358ddf6e6bbee5748279fea62de17edf44caee50b82d4b96d88858019a0e110025a309cd59ab6ed267ff43aeff0c94ddb1b79544d8bf4a7286ca64bbd8da95b621c49672ba6535347bd08d5881043d4dbe59d4806aaab06a08dedf17bc5d6d1f2c1c68472e48e43297d490ab9e4555dfdbad897aebb760f30c83acfdfa4ebcdb19ee8715253331906f2799106cf4c73c3c86f3d52c476c67854e72e4305b8b7d8e72d39f2a66cbb4c9be8b1359c363ee5ba916083ae312be07ec3f0a41e06a2b92eee97b295b2e9806446d957550fff556f0db827f553f5b1fd734553ecb12165e885e06c945572868bca5982594168f0a34c47b0c6ea8ca672a618b9e0042a872e997d8f7458bdbbc07a2a30686ef4219e639dea2a0ba67659f6b7fe4cbf35e912cc99a03a07fb5c170852dc56f290fe4ce9b2c3c0b622510a208fe9cc68657d32a04ac67d5ddab9764ea8bb52c6b26559f42d55fbacaf902fa427c2d44227a9ddea959e8cbf6475eb0531c385aed0078f7181f551833bbf3687717d63881227eacb343944139d227433aa0ff074a89ea12f97d0aa5bbe60fc6fbbe73e01ba1d31c9d9044fdb14a654e27608076ece99b0d0232b8fa3df35043e61d6ed6f5784d12647d714cbb0f55e24790c3bd9e9f475a5bcdd1c0285576c479b6e7ad93680cd6a9661147f4ca2595328ed9a71c975b1668387ef6e8d4a2b9e6f714339cebba2bc5bf5612408f5efdd04bbf20390aeb21f606bb143e783718ed508173644168f1c0c5569cf4b6e21d224d5181b803d2e77b3a7485e0904a9bb4dac150d9b07ffc21664b233d654bab9ee34b9ea309a8d928d20ceaf239cab929206e01f2a0a434fdbe94452f4d72f1a0606dac1367358c3f61773462cedfa6b1fd2a495b02b382b461bab3faabbb471776147b0642da03f19bf2dec3c09c9bff038b84cd7c5e7085a3e24fda37c69d2f8cc2a12dda0bb7ad083b0567ca293465e3cded9609060354307bad2cc5c7f0ef7452c4b6c115c69d4034e23fb79302d041ef7098a87dce6f70f11350978d1fe4d6abbee9dfef00bbc5bd7daf7a08a87962ea65249b1a2eb592af4aabb2933dcd30ba7821e884d034009278c0487b9df8222c294bcbe9d49d2f51e9ac34cc94ae52b17178cb323484402a85e8049e1662510863a8068c20fe448fcbbe594cf033da7ed7efd3f534673dd4e3ed948fad273cf39e4725f330b2101788b6be317d6c2fb74d440c86ee13a06f4eac84ecde61953c50fab4840f263311f6ea243f64c4776c53594fd14eaef06d2ce90b4db445a43caac2d96cdeb05971d07a5b258717b43fe6bb230ba155e55ead48ed3209094cc0e51bcbb8a50185d4215cb68a8c509e3eaafe0f001e22a948bf59202e4f08c5ace3e7257dc90a21916ec466facda3df493a0a82cb774b7a16bd09605e88de58b6b760bcec8c9100c37ec814c8300909e9c74ecfa82c517e8cdd3e0bf6794b2c17afe06f0af95db55d4d88263ac33ecbefbac8931645927eef7a4f2309364b95f054d97591eb9a95981f401d99d0a53c08250af32cf4696d3b68a0510333e7580e1bb3aa0fcaf3cd4015634c925fe8e65d2c992247f9377d344600edc71ecdeda31b8ead0e57b36a3d54059ea20f1bc316e464cd9c0f49aab8f28724bff44f85d83603c94bf2a4ea13aa8224a6eca78132efa46bb285a0bd34640a45145eb775b622876f58096fea2a8dfabbded27976e8d45c5157e80688ba36f02c6d3c797ae799bdb181c47fdd6d335b146745b52d30a326b1396f650cf0552f60f2e9d12f6416a66903511b2dc9f0f4cffd7e05a0f9e4916c749984dc062b48f1592e13d6f78fd044c2fc5cdd1ba992f5fce5edadf0ce710625983982979d051b291b051e4c8863465185b693924011cc42fe0ce744ea24c8765db15813479958b613438f913cc01521d28708a7d71b338ec064a1c03004487a33cb9636006deeda9a82151fa8f88306e5189956e08acd8275717f5f1bd6c0e192a7dde02558a3b504602426cefae0fe8a43c976675bd414f3cebe6dc81a090db32089cdf14f01d1de19ab1f7a15a7ac64a5b845fb124bb2708e6ec2fa3f1e4d7bb9cf38d712d79a4077a5d7d388e0508e1b187f945b2f9121b3e5ce40e98ef030b4ed0a464e98d8bce9f1c8038c939fe9c8d6dd7ab054e81aae01161f49a20a593679db02de36d906cac69615b04a01761f590d52d1c37da9cc5271f58ee062e595958c64d9c13505bb9a91d7f3eecf3fb9daf16bf3ffe8ccfa5e48570b3ebdad0fdd50abb070452156c3aeb5971155175e74d6eb5c5188cf1d3d56effc6831834103e5e5e311acd9fc8c51b09f0f31c7e928d3be3698a2096661dfd84c1ec8a964081396139403ce0b71c4389178ac7c384ffd3032f2846a30784931b217e557f78f2216c86f080c4bdcca216219c40170709f313dd161bab476d7b8ac5d90e3d1ea0e56d8e96a705e217a41a74d75f0d5e7234e75b4e6a6138e9a3c9124ef9a28d41b06c91b23e0b79c1bd21a2581a52ac8978c7ae575703e2cd17c7f3f1930a6fd4ae7bfc4a39f905423ad7ea1bb7a3360f7d5bebd09528da3aae267183217fec98ffd8f3f0ff714a3fc2fa700a4e2c302d8d7793106fa22fc4db8992d5e343cba2020ccf6e9b9fc5e74eeb00e8fd8dac9ce457bbdee4ac250b840120baad9e364901fdca57fac9614bd3734cf548e505cbd88ebdff79a87ed5ac2b6c4a77b5a80b5e8d95fb3b717a2ea331eada47f3d06582562668210b5505be8f107c66dd45b878688f915c7e9d1a50946e3fa6c60af663d4a573f7cae0c0cce79ec5d9f97b680fd20186be3dfc42fc03bb342b97d38da89246b6edbefbd4d411288d01ddeb61c8be23ab956da3a5d852d8faf33639f4b66daee0ef29f255425db27d8a22ef8c9d69e4cb39f2b5d96e7141b93cef8fce86d33723521fe535e62cbcc1d65496c381aad48fd7108558733d2c7a65d307e6deb2d1060b3dce2e4d5ae974159cfcd59277041edf0ebeaffda5c2917171b1a34d075a50187cb127dbe80ca57b642a5dcac7c44c4b9115876789a2381ca32e0c771e34a4f3c0f180a4c1797a4fa23ecc1875a20d5a32519c54ea185f451564becb9d8b22cae056ff9f561dc4aa45c9da20895b787e8d46415f30a462f24d2ab36e3e811b8230540b1a17188674b704685494ef7212bf8ffccabddaba446c87b64b795d211c255afac6bdf045cb6b180cefe1d28397a4da3e5dec9cf05085ddbf64f8e6694f9cf137c1f9d02e796c285b603d5e2ea4acf6946b64faf295922ce29f7a800077805f3164344a50f75a8f743c1569de2935378a505a031cce35c6caabdcf93ff010f92821858c261cf214b8536f640f1284fe8b50efb204c6c225749c40ce5c22c1dbd577f096569be1455f1f4a5194491dbfebffc504c349b174a7b8b5985a7425cbc4aed80cc4b8083c2de46b0e34163e00b37a14cbc7a780d0cb44ac8611b089f72d25e7bffca311b766cb9b0c27c290c7a4eba03f1a5157e1ae31db684025a399ca4280eb520029962bb138957ce5e37b277f660d606c7983ddf61294681a91943c2837075270ed77e543e17498939754fe2bb09738389bd09a63154af48eedaa99cd6e6902ce963e5627f38943e8edb742cb2f3977f483628c2f05b055f9856dc37b0929d4eb10fa3cb5a0013f3d73c35c351f6975e7cae8380783cb569c24090b9b78e705faba968f89ce888eac94b6d17bfa80805c56e7cb260250533904d941e9026d3d27b54ec3de810c084fd89b4a47b9aad3452ab0cc32566ea3b42e53a517bc86da17e075f5528d45706afa7d3f01da527197bfef1ae0b6711971e56d4d0e6489e163a355624349cb651f6f39f4d2e778316d54b5056d26eb25a373b8a28df746ba7f7cb4ac75f628b3d13b2a0053e4b807f62f350e49e6dd893dd6641fe8f8e05d03aa469c52981fef9b6c2de92641974d67d4ac4383cf033f79e997f3544875427d0275f124be8ec882d52e09ca72d05c4ff849ac94a90f0c733cf9d159e3b5ad2ff9ecb7211e78c2158982388056c46d4072c645b512c21e64986e8a1a256434e1ffd7d719da0662fb776267f83769388bd779fb877037d82b9ecc77cb4b28faec85b148088431f5002f9845a5e4f402cf5398ed3e5e828389ae0a007f9109a12ed59fece19c3497d9ebb8a3ff1bd85410deab20d24ccd368163239fc48e016f64ac77438a44c5839d7071bd3dc1694fa38918f2a312a6ee27fb45b1e5693d1412b3b4d450bfba3543625fb76891bb8f6cf3246d610e519cd99dffd8d860a9700f325d1979571af4c83d8ade34b4bf88ddd3768b48d8aad079939953d1e63d3a5f1f3b77de90f6c6d0408d83939362c7995fb0a7cd8cfeb36c1ba0708ab5c5d185e624fae52a26f5f0ef63783767442227b3d7e2c9b5879354a9c5aa6f87a8345bb8580a272aab56b6b896993ab25d9dcfb19a3aed64ce954fa61130d6613a37cec92da1ef11b31fc5e2e098a604c31d7d4f11e14eb9d92a7a6ef3134ecfb8df12ca8f4d8e3f9dc0f74c0b3f1fe807f06c160da670acf3d1bbe3f7541be720d20fa66d34ee5ada7acb37359e9a450e5dc64b789d45db98ff8777b15bbfaaff9004f14df674af1af5c6c2468c6a8f3c833ec27fe72bbe636f6496077774ee6cd270e2e977fba77fbb9657dc01b32bd14030ff4d3dcfeb718bd9358a9842be95232b3335b9d4143dc93fb2876b3b4917aa8f1425a99dcab5993a88e31b7bd94ee2434d0b259ef540d0ef971bf45542bcbb00bbf46ee0c2b363cc540f4c7018c447cc6d4f297be9a522ff8293eceb07d5100907fcdbda2a6a243f4eabebe2b0f4da9f45a3bff97b2c506a7db0dba3a7bd8a301876c14bff1d275bbfb43a7c5cb1f3176a063300c67beeb3fca7736a133df952d9104560515e015865d62564841ce8f043ee2780760eee491e4bef8c8520abaa88a2f5a52632061897ae00eac33ffae37893812276d0982f20bd573fb4accee49cdf8b54f632a3a4d0c2c51d74316a58ddaf608360563c5a1c3907924c437cb11b03bbc3c8de001fb9f6a18fb59b36eca742d782956e0ffc4bf3c85aab0d38ac4426d8cb7a0265c584636cd4795d2a5d43e9756858fff8fc99404bac3669bbd568bb6d34ef92196dee70f454feb3ccee5ed46dc6fab77ca1563244002fa1a11a43f8980225b91eb598d564d32842342f447eda6bd0f13a65cdd13f7f45778e3a4fed704cf82f996b0bee3a916878437054135bec71f40e17bf37eca1c07ed8a6ef4ccfe8875ad09879a717fb124898b1aae337700ca715baefff11", 0x1000, 0x1000}, {&(0x7f0000001900)="4f0b5e955b4f2150c6bdee75d82a91065946f8e8f92f5505ade1bc49f459e23afca14a0722340c26f893bf9974ea6dcbf1b62af0af0fe2ad24649d8166841f0d7631111f527155eeb21f52231f50f2169e43a938545891e69e136181644588b31a95f687ada6b372593c122af93b9a88e670c9270b10cefc10fc9cecdc2b1434cbc7638e0310b4391809d9", 0x8b, 0x1}, {&(0x7f00000019c0)="29714af0241f253fe3cc3b9ba458378691b12bef75029652cdd550fccdac40eff8d03d0410adebd3d14855ed1ca5206a2bc249e84c19ce27bbdc45758b668cc81e3087ff437c4d2479fe64c2f31ea0d5c063260ba80566084b46f518c8b88eaa59522b65931ed023519fad86be62da31e76366dae1c1cc9cc2313d4a7757b79f76db4536f2c80e50ed07eb9a75912480a2b79d34abb1b6a0f82750275aa8b6eb5547ae969e1f64f2e698a9", 0xab, 0x3}], 0x1084c80, &(0x7f0000001b40)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@bsdgroups}, {@nobarrier}, {@errors_remount}, {@min_batch_time={'min_batch_time', 0x3d, 0x2}}, {@jqfmt_vfsv1}], [{@fowner_lt={'fowner<', r0}}]}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7a00, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:13:32 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 8) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2472.236715] loop1: detected capacity change from 0 to 33559552 [ 2472.249647] loop2: detected capacity change from 0 to 130560 [ 2472.378723] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2472.378723] program syz-executor.1 not setting count and/or reply_len properly [ 2472.407866] FAULT_INJECTION: forcing a failure. [ 2472.407866] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2472.410596] CPU: 1 PID: 13371 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2472.412060] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2472.413849] Call Trace: [ 2472.414410] dump_stack+0x107/0x167 [ 2472.415177] should_fail.cold+0x5/0xa [ 2472.415995] __alloc_pages_nodemask+0x182/0x600 [ 2472.417008] ? __kmalloc+0x16e/0x390 [ 2472.417805] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2472.419088] ? trace_hardirqs_on+0x5b/0x180 [ 2472.420010] alloc_pages_current+0x187/0x280 [ 2472.420970] sg_build_indirect.isra.0+0x2f5/0x710 [ 2472.422007] sg_common_write.constprop.0+0x992/0x1a30 [ 2472.423115] ? sg_build_indirect.isra.0+0x710/0x710 [ 2472.424169] ? vprintk_func+0x8e/0x140 [ 2472.425021] ? vprintk_func+0x93/0x140 [ 2472.425854] ? printk+0xba/0xf1 [ 2472.426561] ? record_print_text.cold+0x16/0x16 [ 2472.427553] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2472.428659] ? trace_hardirqs_on+0x5b/0x180 [ 2472.429585] sg_write.part.0+0x69e/0xaa0 [ 2472.430467] ? sg_new_write.isra.0+0x770/0x770 [ 2472.431443] ? find_held_lock+0x2c/0x110 [ 2472.432325] ? __might_fault+0xd3/0x180 [ 2472.433174] ? lock_downgrade+0x6d0/0x6d0 [ 2472.434137] ? _cond_resched+0x10/0x30 [ 2472.434987] ? inode_security+0x107/0x140 [ 2472.435881] ? avc_policy_seqno+0x9/0x70 [ 2472.436757] ? selinux_file_permission+0x92/0x520 [ 2472.437817] sg_write+0x87/0x120 [ 2472.438554] do_iter_write+0x4f0/0x700 [ 2472.439400] ? import_iovec+0x83/0xb0 [ 2472.440224] vfs_writev+0x1ae/0x620 [ 2472.441036] ? vfs_iter_write+0xa0/0xa0 [ 2472.441904] ? __fget_files+0x2cf/0x520 [ 2472.442750] ? lock_downgrade+0x6d0/0x6d0 [ 2472.443632] ? find_held_lock+0x2c/0x110 [ 2472.444545] ? ksys_write+0x12d/0x260 [ 2472.445378] ? __fget_files+0x2f8/0x520 [ 2472.446254] ? __fget_light+0xea/0x290 [ 2472.447095] do_writev+0x139/0x300 [ 2472.447854] ? vfs_writev+0x620/0x620 [ 2472.448694] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2472.449832] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2472.450942] do_syscall_64+0x33/0x40 [ 2472.451742] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2472.452865] RIP: 0033:0x7f952207fb19 [ 2472.453659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2472.457614] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2472.459241] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2472.460767] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2472.462290] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2472.463810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2472.465340] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 [ 2472.541312] loop2: detected capacity change from 0 to 130560 20:13:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xef53, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:13:48 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, 0xfffffffffffffec8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, r1}, 0xfffffffffffffec8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f0000001900)={0x184, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [{{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}]}, 0x184}, 0x1, 0x0, 0x0, 0x20000000}, 0xc865) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:48 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 9) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:13:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:48 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481269, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:13:48 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x0, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:13:48 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x4000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:13:48 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) open(&(0x7f0000000000)='./file0\x00', 0x900, 0x73) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2487.899472] loop1: detected capacity change from 0 to 33559552 20:13:48 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, r1, 0x0) [ 2488.098628] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2488.098628] program syz-executor.1 not setting count and/or reply_len properly [ 2488.103363] FAULT_INJECTION: forcing a failure. [ 2488.103363] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2488.106188] CPU: 0 PID: 13394 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2488.107703] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2488.109518] Call Trace: [ 2488.110100] dump_stack+0x107/0x167 [ 2488.110899] should_fail.cold+0x5/0xa [ 2488.111742] __alloc_pages_nodemask+0x182/0x600 [ 2488.112774] ? __kmalloc+0x16e/0x390 [ 2488.113595] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2488.114918] ? trace_hardirqs_on+0x5b/0x180 [ 2488.115868] alloc_pages_current+0x187/0x280 [ 2488.116847] sg_build_indirect.isra.0+0x2f5/0x710 [ 2488.117915] sg_common_write.constprop.0+0x992/0x1a30 [ 2488.119064] ? sg_build_indirect.isra.0+0x710/0x710 [ 2488.120212] ? vprintk_func+0x93/0x140 [ 2488.121113] ? printk+0xba/0xf1 [ 2488.121917] ? record_print_text.cold+0x16/0x16 [ 2488.123045] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2488.124172] ? trace_hardirqs_on+0x5b/0x180 [ 2488.125121] sg_write.part.0+0x69e/0xaa0 [ 2488.125998] ? sg_new_write.isra.0+0x770/0x770 [ 2488.126984] ? find_held_lock+0x2c/0x110 [ 2488.127866] ? __might_fault+0xd3/0x180 [ 2488.128718] ? lock_downgrade+0x6d0/0x6d0 [ 2488.129634] ? _cond_resched+0x10/0x30 [ 2488.130468] ? inode_security+0x107/0x140 [ 2488.131365] ? avc_policy_seqno+0x9/0x70 [ 2488.132231] ? selinux_file_permission+0x92/0x520 [ 2488.133285] sg_write+0x87/0x120 [ 2488.134017] do_iter_write+0x4f0/0x700 [ 2488.134863] ? import_iovec+0x83/0xb0 [ 2488.135687] vfs_writev+0x1ae/0x620 [ 2488.136476] ? vfs_iter_write+0xa0/0xa0 [ 2488.137341] ? __fget_files+0x2cf/0x520 [ 2488.138200] ? lock_downgrade+0x6d0/0x6d0 [ 2488.139089] ? find_held_lock+0x2c/0x110 [ 2488.139971] ? ksys_write+0x12d/0x260 [ 2488.140803] ? __fget_files+0x2f8/0x520 [ 2488.141666] ? __fget_light+0xea/0x290 [ 2488.142511] do_writev+0x139/0x300 [ 2488.143280] ? vfs_writev+0x620/0x620 [ 2488.144109] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2488.145250] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2488.146368] do_syscall_64+0x33/0x40 [ 2488.147172] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2488.148277] RIP: 0033:0x7f952207fb19 [ 2488.149081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2488.153048] RSP: 002b:00007f951f5f5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2488.154684] RAX: ffffffffffffffda RBX: 00007f9522192f60 RCX: 00007f952207fb19 [ 2488.156217] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 000000000000000a [ 2488.157769] RBP: 00007f951f5f51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2488.159301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2488.160847] R13: 00007ffd2a29b96f R14: 00007f951f5f5300 R15: 0000000000022000 20:13:48 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048126c, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:13:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xff0f, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:14:04 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x400, 0x130) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:14:04 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x6000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:14:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 10) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:14:04 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="1f53095eb58000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000400)=ANY=[@ANYBLOB="50010000100001000000000000000000ac141441000000000000000000000000fe8000000000000000000000000000aa00"/64, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="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"], 0x150}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000003c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x7, 0x400, 0x4, @empty, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x7, 0x7800, 0x9, 0x28}}) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000001900)=@newsa={0x10c, 0x10, 0x4, 0x70bd2a, 0x25dfdbfd, {{@in6=@dev={0xfe, 0x80, '\x00', 0x35}, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x0, 0x4e23, 0x0, 0x2, 0x20, 0xa0, 0xc, r2, 0xee00}, {@in=@rand_addr=0x64010101, 0x4d2, 0x6c}, @in6=@empty, {0x2, 0x4, 0x100000000, 0xef, 0x4, 0x101, 0x7, 0x3}, {0x6, 0x3, 0x8, 0xffffffffffffff81}, {0xffffffff, 0x300}, 0x70bd2d, 0x34ff, 0x2, 0x3, 0x1}, [@encap={0x1c, 0x4, {0xfffffffffffffffd, 0x4e20, 0x4e22, @in6=@local}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x20000001}, 0x5) 20:14:04 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x0, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:04 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048126f, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:14:04 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2503.750841] loop1: detected capacity change from 0 to 33559552 20:14:04 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x300000b, 0x13, 0xffffffffffffffff, 0x8000000) mknod(&(0x7f0000000000)='./file0\x00', 0x1, 0x9) [ 2503.835294] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 20:14:04 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x0, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:04 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481270, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2503.885608] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2503.885608] program syz-executor.1 not setting count and/or reply_len properly [ 2503.887673] FAULT_INJECTION: forcing a failure. [ 2503.887673] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2503.889227] CPU: 0 PID: 13466 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2503.890071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2503.891087] Call Trace: [ 2503.891416] dump_stack+0x107/0x167 [ 2503.891916] should_fail.cold+0x5/0xa [ 2503.892405] __alloc_pages_nodemask+0x182/0x600 [ 2503.892974] ? __kmalloc+0x16e/0x390 [ 2503.893444] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2503.894187] ? trace_hardirqs_on+0x5b/0x180 [ 2503.894715] alloc_pages_current+0x187/0x280 [ 2503.895260] sg_build_indirect.isra.0+0x2f5/0x710 [ 2503.895857] sg_common_write.constprop.0+0x992/0x1a30 [ 2503.896500] ? sg_build_indirect.isra.0+0x710/0x710 [ 2503.897120] ? vprintk_func+0x93/0x140 [ 2503.897598] ? printk+0xba/0xf1 [ 2503.898001] ? record_print_text.cold+0x16/0x16 [ 2503.898583] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2503.899200] ? trace_hardirqs_on+0x5b/0x180 [ 2503.899754] sg_write.part.0+0x69e/0xaa0 [ 2503.900255] ? sg_new_write.isra.0+0x770/0x770 [ 2503.900825] ? find_held_lock+0x2c/0x110 [ 2503.901339] ? __might_fault+0xd3/0x180 [ 2503.901832] ? lock_downgrade+0x6d0/0x6d0 [ 2503.902368] ? _cond_resched+0x10/0x30 [ 2503.902843] ? inode_security+0x107/0x140 [ 2503.903352] ? avc_policy_seqno+0x9/0x70 [ 2503.903842] ? selinux_file_permission+0x92/0x520 [ 2503.904442] sg_write+0x87/0x120 [ 2503.904860] do_iter_write+0x4f0/0x700 [ 2503.905356] ? import_iovec+0x83/0xb0 [ 2503.905823] vfs_writev+0x1ae/0x620 [ 2503.906266] ? vfs_iter_write+0xa0/0xa0 [ 2503.906749] ? __fget_files+0x2cf/0x520 [ 2503.907236] ? lock_downgrade+0x6d0/0x6d0 [ 2503.907739] ? find_held_lock+0x2c/0x110 [ 2503.908235] ? ksys_write+0x12d/0x260 [ 2503.908699] ? __fget_files+0x2f8/0x520 [ 2503.909211] ? __fget_light+0xea/0x290 [ 2503.909685] do_writev+0x139/0x300 [ 2503.910122] ? vfs_writev+0x620/0x620 [ 2503.910591] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2503.911227] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2503.911866] do_syscall_64+0x33/0x40 [ 2503.912318] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2503.912945] RIP: 0033:0x7f952207fb19 [ 2503.913425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2503.915681] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2503.916615] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2503.917492] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2503.918386] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2503.919260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2503.920165] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:14:04 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)=""/79, 0x4f}], 0x1, &(0x7f0000000140)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}, 0x2062) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000300)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setresuid(r3, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:14:04 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:04 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, r1, 0x400, 0x70bd26, 0x25dfdbfc, {{}, {}, {0x8, 0x11, 0xff}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x48001}, 0x40) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2fecd045b18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)=ANY=[@ANYBLOB='grpjquotaD./file0,uid>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:14:04 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x0, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:04 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481275, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:14:21 executing program 3: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:14:21 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x23ef, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f53d05eb188000000000a017626fc19c7773fd8494633b8c22fe0d545f9f3a38b124f"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)=ANY=[@ANYBLOB="3d512f660ddf116505250a00"/22, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:14:21 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:14:21 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x6100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:14:21 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481278, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:14:21 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x0, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:21 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 11) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2520.826819] loop1: detected capacity change from 0 to 33559552 20:14:21 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc04812ba, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:14:21 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, "77004a6efdff0000000008002600", 0x0, 0x401}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r2 = syz_open_pts(0xffffffffffffffff, 0x208c02) ioctl$KDENABIO(r2, 0x4b36) mq_open(&(0x7f0000000000)='-@\x00\xb7!\xf9Z\xbb,;\x7f\xc0\xa9J\xb3\v\xfb\x84\xaa\xb5\x9a\xa4O\xa8\xb5\xd2\x13/z\v\xae\xfc\xfek*D\xeb{\t\xba>\xe8\xe2\xba\x00\x00\x00\x00\x00\x00\xd0zd\xccD\xf4a\xd8/\x90x\xb5\xd8\x04\x19u\xf9D\xb7Eq\xc1\xcee\xd9\b0\xec\v\xe3\x96\x1f\x80\xe4Nk\xa6\xe1\b\x97,\x8b/\x96\x9b\xdb&\xd1\xe3J\xd5\xaf\xe3\xfc\xde\xbe\xa0\x8b\xeb\xea%\x10eW\xf6\xa0J\xe51\xa4\xfesm\x96\x89\x0f\xea\xa6\xc02\xd4\xb8y\x83L\xc4\x93U\x15\x9b\f\x9b\xc3Z\xff\\\x9d\x83\xe6\xc7fc\xa9n\x8e\aV\xe8\xf9\xf9\xe4\xfb+~\xabu\xf9K\x1d9[\xcd\x9b;=6Q\x80', 0x3, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000200)=""/230, 0xe6, 0x2) socket$inet(0x2, 0xa, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000300)={'wg2\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000580)={'syz_tun\x00'}) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = syz_mount_image$nfs4(&(0x7f0000000180), &(0x7f0000000340)='./file0\x00', 0x2, 0x0, &(0x7f0000000480), 0x80000, &(0x7f0000000780)={[{'*'}, {'\''}, {'wg2\x00'}, {'/dev/net/tun\x00'}, {'veth0_vlan\x00'}, {'/dev/net/tun\x00'}, {'-@\x00\xb7!\xf9Z\xbb,;\x7f\xc0\xa9J\xb3\v\xfb\x84\xaa\xb5\x9a\xa4O\xa8\xb5\xd2\x13/z\v\xae\xfc\xfek*D\xeb{\t\xba>\xe8\xe2\xba\x00\x00\x00\x00\x00\x00\xd0zd\xccD\xf4a\xd8/\x90x\xb5\xd8\x04\x19u\xf9D\xb7Eq\xc1\xcee\xd9\b0\xec\v\xe3\x96\x1f\x80\xe4Nk\xa6\xe1\b\x97,\x8b/\x96\x9b\xdb&\xd1\xb6\xd5\xbb\x90\xa8+*\xd7\x91I\xe3J\xd5\xaf\xe3\xfc\xde\xbe\xa0\x8b\xeb\xea-\x10eW\xf6\xa0J\xe51\xa4\xfesm\x96\x89\x0f\xea\xa6\xc02\xd4\xb8y\x83L\xc4\x93U\x15\x9b\f\x9b\xc3Z\xff\\\x9d\x83\xe6\xc7fc\xa9n\x8e\aV\xe8\xf9\xf9\xe4\xfb\v~\xabu\xf9K'}, {'wg2\x00'}], [{@obj_type={'obj_type', 0x3d, '-@\x00\xb7!\xf9Z\xbb,;\x7f\xc0\xa9J\xb3\v\xfb\x84\xaa\xb5\x9a\xa4O\xa8\xb5\xd2\x13/z\v\xae\xfc\xfek*D\xeb{\t\xba>\xe8\xe2\xba\x00\x00\x00\x00\x00\x00\xd0zd\xccD\xf4a\xd8/\x90x\xb5\xd8\x04\x19u\xf9D\xb7Eq\xc1\xcee\xd9\b0\xec\v\xe3\x96\x1f\x80\xe4Nk\xa6\xe1\b\x97,\x8b/\x96\x9b\xdb&\xd1\xe3J\xd5\xaf\xe3\xfc\xde\xbe\xa0\x8b\xeb\xea%\x10eW\xf6\xa0J\xe51\xa4\xfesm\x96\x89\x0f\xea\xa6\xc02\xd4\xb8y\x83L\xc4\x93U\x15\x9b\f\x9b\xc3Z\xff\\\x9d\x83\xe6\xc7fc\xa9n\x8e\aV\xe8\xf9\xf9\xe4\xfb+~\xabu\xf9K\x1d9[\xcd\x9b;=6Q\x80'}}, {@dont_hash}, {@dont_measure}, {@hash}]}) openat(r5, &(0x7f0000000980)='./file0\x00', 0x268c40, 0x108) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) ioctl$VT_GETMODE(r4, 0x5601, &(0x7f0000000100)) dup3(0xffffffffffffffff, r1, 0x80000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) [ 2521.018464] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2521.018464] program syz-executor.1 not setting count and/or reply_len properly [ 2521.022573] FAULT_INJECTION: forcing a failure. [ 2521.022573] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2521.025518] CPU: 1 PID: 13532 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2521.027066] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2521.028904] Call Trace: [ 2521.029519] dump_stack+0x107/0x167 [ 2521.030335] should_fail.cold+0x5/0xa [ 2521.031189] __alloc_pages_nodemask+0x182/0x600 [ 2521.032221] ? __kmalloc+0x16e/0x390 [ 2521.033071] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2521.034432] ? trace_hardirqs_on+0x5b/0x180 [ 2521.035402] alloc_pages_current+0x187/0x280 [ 2521.036387] sg_build_indirect.isra.0+0x2f5/0x710 [ 2521.037486] sg_common_write.constprop.0+0x992/0x1a30 [ 2521.038657] ? sg_build_indirect.isra.0+0x710/0x710 [ 2521.039773] ? vprintk_func+0x93/0x140 [ 2521.040638] ? printk+0xba/0xf1 [ 2521.041388] ? record_print_text.cold+0x16/0x16 [ 2521.042428] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2521.043550] ? trace_hardirqs_on+0x5b/0x180 [ 2521.044561] sg_write.part.0+0x69e/0xaa0 [ 2521.045483] ? sg_new_write.isra.0+0x770/0x770 [ 2521.046517] ? find_held_lock+0x2c/0x110 [ 2521.047443] ? __might_fault+0xd3/0x180 [ 2521.048327] ? lock_downgrade+0x6d0/0x6d0 [ 2521.049299] ? _cond_resched+0x10/0x30 [ 2521.050170] ? inode_security+0x107/0x140 [ 2521.051100] ? avc_policy_seqno+0x9/0x70 [ 2521.051997] ? selinux_file_permission+0x92/0x520 [ 2521.053093] sg_write+0x87/0x120 [ 2521.053869] do_iter_write+0x4f0/0x700 [ 2521.054746] ? import_iovec+0x83/0xb0 [ 2521.055599] vfs_writev+0x1ae/0x620 [ 2521.056420] ? vfs_iter_write+0xa0/0xa0 [ 2521.057329] ? __fget_files+0x2cf/0x520 [ 2521.058222] ? lock_downgrade+0x6d0/0x6d0 [ 2521.059151] ? find_held_lock+0x2c/0x110 [ 2521.060064] ? ksys_write+0x12d/0x260 [ 2521.060914] ? __fget_files+0x2f8/0x520 [ 2521.061833] ? __fget_light+0xea/0x290 [ 2521.062710] do_writev+0x139/0x300 [ 2521.063515] ? vfs_writev+0x620/0x620 [ 2521.064371] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2521.065565] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2521.066795] do_syscall_64+0x33/0x40 [ 2521.067624] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2521.068761] RIP: 0033:0x7f952207fb19 [ 2521.069596] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2521.073710] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2521.075402] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2521.076982] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2521.078577] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2521.080170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2521.081764] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:14:21 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:21 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:21 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x0, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:21 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 12) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:14:21 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:14:21 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00') stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) creat(&(0x7f0000000100)='./file1\x00', 0x100) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r4, r5, 0x1000) fchownat(r2, &(0x7f0000000000)='./file0\x00', r3, r5, 0x1000) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2521.478708] loop1: detected capacity change from 0 to 33559552 20:14:22 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYRES64=r1, @ANYRES16=r0, @ANYRES32=r3, @ANYRESOCT=r2, @ANYRES64]) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r5 = syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) listxattr(&(0x7f0000000480)='\x00', &(0x7f0000000540)=""/123, 0x7b) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000010000001800000f95c4a7b2d5caed8d7c4f8cfd9560c45bb0514283ea50c8967012e1a89b9d0c09926b360009f650bd864d65c99ece430de2eb090b9ed74c81bf22a365462882b6cecd160505055963aeedd9a533af33712d8b1fc8805d124c651abb4534d63797049a000000c7f9f1093ab271524aac5d72bf970598cd98575e3c0dc0d33f", @ANYRES32=r5, @ANYBLOB="d6000000000000002e2f66696c653000"]) openat(r6, &(0x7f0000000340)='./file0\x00', 0x8003, 0x60) [ 2521.624085] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2521.624085] program syz-executor.1 not setting count and/or reply_len properly [ 2521.629279] FAULT_INJECTION: forcing a failure. [ 2521.629279] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2521.631912] CPU: 1 PID: 13576 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2521.633417] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2521.635201] Call Trace: [ 2521.635774] dump_stack+0x107/0x167 [ 2521.636548] should_fail.cold+0x5/0xa [ 2521.637370] __alloc_pages_nodemask+0x182/0x600 [ 2521.638354] ? __kmalloc+0x16e/0x390 [ 2521.639141] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2521.640419] ? trace_hardirqs_on+0x5b/0x180 [ 2521.641349] alloc_pages_current+0x187/0x280 [ 2521.642286] sg_build_indirect.isra.0+0x2f5/0x710 [ 2521.643320] sg_common_write.constprop.0+0x992/0x1a30 [ 2521.644414] ? sg_build_indirect.isra.0+0x710/0x710 [ 2521.645633] ? vprintk_func+0x93/0x140 [ 2521.646477] ? printk+0xba/0xf1 [ 2521.647194] ? record_print_text.cold+0x16/0x16 [ 2521.648208] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2521.649309] ? trace_hardirqs_on+0x5b/0x180 [ 2521.650252] sg_write.part.0+0x69e/0xaa0 [ 2521.651135] ? sg_new_write.isra.0+0x770/0x770 [ 2521.652212] ? find_held_lock+0x2c/0x110 [ 2521.653291] ? __might_fault+0xd3/0x180 [ 2521.654335] ? lock_downgrade+0x6d0/0x6d0 [ 2521.655439] ? _cond_resched+0x10/0x30 [ 2521.656414] ? inode_security+0x107/0x140 [ 2521.657466] ? avc_policy_seqno+0x9/0x70 [ 2521.658441] ? selinux_file_permission+0x92/0x520 [ 2521.659622] sg_write+0x87/0x120 [ 2521.660462] do_iter_write+0x4f0/0x700 [ 2521.661432] ? import_iovec+0x83/0xb0 [ 2521.662394] vfs_writev+0x1ae/0x620 [ 2521.663266] ? vfs_iter_write+0xa0/0xa0 [ 2521.664336] ? __fget_files+0x2cf/0x520 [ 2521.665284] ? lock_downgrade+0x6d0/0x6d0 [ 2521.666340] ? find_held_lock+0x2c/0x110 [ 2521.667255] ? ksys_write+0x12d/0x260 [ 2521.668110] ? __fget_files+0x2f8/0x520 [ 2521.668995] ? __fget_light+0xea/0x290 [ 2521.669886] do_writev+0x139/0x300 [ 2521.670694] ? vfs_writev+0x620/0x620 [ 2521.671614] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2521.672925] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2521.674225] do_syscall_64+0x33/0x40 [ 2521.675155] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2521.676450] RIP: 0033:0x7f952207fb19 [ 2521.677379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2521.681838] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2521.683699] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2521.685484] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2521.687287] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2521.689085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2521.690899] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:14:22 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x3, 0x2}, {0xfffffffb, 0xfff}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:14:22 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x6e00, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:14:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x400000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:14:22 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x0, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:22 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:22 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:14:22 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r4, r5, 0x1000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001bc0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0, r1}}, './file0\x00'}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000001d00)={{}, {0x1, 0x5}, [{0x2, 0x6, r0}, {0x2, 0x1, r0}, {0x2, 0x1, r0}, {0x2, 0x3, r0}, {0x2, 0x7, r0}], {0x4, 0x1}, [{0x8, 0x0, r3}, {0x8, 0x6, r5}, {0x8, 0x6, r6}], {0x10, 0x1}, {0x20, 0x5f2e82d8461225c5}}, 0x64, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r7, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r8, 0x0) setresuid(r2, r7, r8) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:14:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:14:36 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x6f00, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:14:36 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 13) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:14:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:36 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000340)='./file0\x00') 20:14:36 executing program 3: stat(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) setreuid(r0, r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) io_uring_enter(r3, 0x58ab, 0x0, 0x0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x1ff) 20:14:36 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:14:36 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x0, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2535.703672] loop1: detected capacity change from 0 to 33559552 [ 2535.872499] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2535.872499] program syz-executor.1 not setting count and/or reply_len properly [ 2535.876276] FAULT_INJECTION: forcing a failure. [ 2535.876276] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2535.878900] CPU: 1 PID: 13617 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2535.880426] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2535.882295] Call Trace: [ 2535.882883] dump_stack+0x107/0x167 [ 2535.883701] should_fail.cold+0x5/0xa [ 2535.884555] __alloc_pages_nodemask+0x182/0x600 [ 2535.885604] ? __kmalloc+0x16e/0x390 [ 2535.886440] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2535.887789] ? trace_hardirqs_on+0x5b/0x180 [ 2535.888769] alloc_pages_current+0x187/0x280 [ 2535.889755] sg_build_indirect.isra.0+0x2f5/0x710 [ 2535.890797] sg_common_write.constprop.0+0x992/0x1a30 [ 2535.891866] ? sg_build_indirect.isra.0+0x710/0x710 [ 2535.892891] ? vprintk_func+0x93/0x140 [ 2535.893725] ? printk+0xba/0xf1 [ 2535.894391] ? record_print_text.cold+0x16/0x16 [ 2535.895361] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2535.896398] ? trace_hardirqs_on+0x5b/0x180 [ 2535.897280] sg_write.part.0+0x69e/0xaa0 [ 2535.898154] ? sg_new_write.isra.0+0x770/0x770 [ 2535.899095] ? find_held_lock+0x2c/0x110 [ 2535.899929] ? __might_fault+0xd3/0x180 [ 2535.900745] ? lock_downgrade+0x6d0/0x6d0 [ 2535.901840] ? _cond_resched+0x10/0x30 [ 2535.902663] ? inode_security+0x107/0x140 [ 2535.903601] ? avc_policy_seqno+0x9/0x70 [ 2535.904444] ? selinux_file_permission+0x92/0x520 [ 2535.905574] sg_write+0x87/0x120 [ 2535.906318] do_iter_write+0x4f0/0x700 [ 2535.907139] ? import_iovec+0x83/0xb0 [ 2535.907947] vfs_writev+0x1ae/0x620 [ 2535.908709] ? vfs_iter_write+0xa0/0xa0 [ 2535.909553] ? __fget_files+0x2cf/0x520 [ 2535.910396] ? lock_downgrade+0x6d0/0x6d0 [ 2535.911264] ? find_held_lock+0x2c/0x110 [ 2535.912107] ? ksys_write+0x12d/0x260 [ 2535.912910] ? __fget_files+0x2f8/0x520 [ 2535.913757] ? __fget_light+0xea/0x290 [ 2535.914567] do_writev+0x139/0x300 [ 2535.915310] ? vfs_writev+0x620/0x620 [ 2535.916116] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2535.917203] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2535.918305] do_syscall_64+0x33/0x40 [ 2535.919092] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2535.920160] RIP: 0033:0x7f952207fb19 [ 2535.920939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2535.924839] RSP: 002b:00007f951f5f5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2535.926459] RAX: ffffffffffffffda RBX: 00007f9522192f60 RCX: 00007f952207fb19 [ 2535.927948] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 000000000000000a [ 2535.929446] RBP: 00007f951f5f51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2535.930968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2535.932472] R13: 00007ffd2a29b96f R14: 00007f951f5f5300 R15: 0000000000022000 20:14:36 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x0, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:14:54 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x1020000, &(0x7f00000000c0)={'trans=unix,', {[{@version_L}, {@noextend}, {@posixacl}, {@version_u}, {@access_client}, {@afid={'afid', 0x3d, 0x1fa}}, {@loose}, {@loose}, {@access_client}], [{@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x37, 0x62, 0x63, 0x32, 0x5b, 0x33], 0x2d, [0x66, 0x35, 0x64, 0x36], 0x2d, [0x62, 0x35, 0x62, 0x31], 0x2d, [0x34, 0x39, 0x38, 0x31], 0x2d, [0x35, 0x35, 0x63, 0x31, 0x30, 0x31, 0x38, 0x32]}}}, {@appraise}, {@euid_gt={'euid>', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x1, 0x30, 0x36, 0x34, 0x64, 0x66], 0x2d, [0xcc, 0x33, 0x65, 0x39], 0x2d, [0x37, 0x61, 0x61, 0x65], 0x2d, [0x33, 0x33, 0x63, 0x31], 0x2d, [0x66, 0x66, 0x37, 0x37, 0x32, 0x37, 0x64, 0x65]}}}, {@euid_gt={'euid>', r1}}, {@dont_hash}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@subj_user={'subj_user', 0x3d, '\xb9)(]'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}}) 20:14:54 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x8004, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:14:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:54 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:14:54 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)=ANY=[@ANYBLOB='grpjquota=./file0,uid>', @ANYRESDEC=0x0, @ANYBLOB="1900"]) 20:14:54 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x0, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 14) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2554.241782] blktrace: Concurrent blktraces are not allowed on loop14 [ 2554.368290] loop1: detected capacity change from 0 to 33559552 20:14:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:54 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:14:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:55 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2554.536549] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2554.536549] program syz-executor.1 not setting count and/or reply_len properly [ 2554.540627] FAULT_INJECTION: forcing a failure. [ 2554.540627] name failslab, interval 1, probability 0, space 0, times 0 [ 2554.543277] CPU: 0 PID: 13678 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2554.545015] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2554.547098] Call Trace: [ 2554.547732] dump_stack+0x107/0x167 [ 2554.548628] should_fail.cold+0x5/0xa [ 2554.549575] ? blk_rq_map_user_iov+0x2aa/0x1a60 [ 2554.550792] should_failslab+0x5/0x20 [ 2554.551727] __kmalloc+0x72/0x390 [ 2554.552583] blk_rq_map_user_iov+0x2aa/0x1a60 [ 2554.553673] ? sg_common_write.constprop.0+0x992/0x1a30 [ 2554.554953] ? sg_write.part.0+0x69e/0xaa0 [ 2554.555999] ? sg_write+0x87/0x120 [ 2554.556868] ? blk_rq_unmap_user+0x750/0x750 [ 2554.557974] ? find_held_lock+0x2c/0x110 [ 2554.559017] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2554.560339] ? lock_downgrade+0x6d0/0x6d0 [ 2554.561464] ? import_single_range+0x24d/0x2e0 [ 2554.562613] blk_rq_map_user+0x103/0x170 [ 2554.563542] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2554.564781] ? alloc_pages_current+0x18f/0x280 [ 2554.565818] ? sg_build_indirect.isra.0+0x448/0x710 [ 2554.566884] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2554.568074] ? sg_build_indirect.isra.0+0x710/0x710 [ 2554.569314] ? vprintk_func+0x93/0x140 [ 2554.570289] ? record_print_text.cold+0x16/0x16 [ 2554.571495] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2554.572821] ? trace_hardirqs_on+0x5b/0x180 [ 2554.573971] sg_write.part.0+0x69e/0xaa0 [ 2554.575040] ? sg_new_write.isra.0+0x770/0x770 [ 2554.576253] ? find_held_lock+0x2c/0x110 [ 2554.577320] ? __might_fault+0xd3/0x180 [ 2554.578379] ? lock_downgrade+0x6d0/0x6d0 [ 2554.579484] ? _cond_resched+0x10/0x30 [ 2554.580496] ? inode_security+0x107/0x140 [ 2554.581574] ? avc_policy_seqno+0x9/0x70 [ 2554.582637] ? selinux_file_permission+0x92/0x520 [ 2554.583927] sg_write+0x87/0x120 [ 2554.584828] do_iter_write+0x4f0/0x700 [ 2554.585867] ? import_iovec+0x83/0xb0 [ 2554.586879] vfs_writev+0x1ae/0x620 [ 2554.587850] ? vfs_iter_write+0xa0/0xa0 [ 2554.588896] ? __fget_files+0x2cf/0x520 [ 2554.589955] ? lock_downgrade+0x6d0/0x6d0 [ 2554.591055] ? find_held_lock+0x2c/0x110 [ 2554.592110] ? ksys_write+0x12d/0x260 [ 2554.593113] ? __fget_files+0x2f8/0x520 [ 2554.594172] ? __fget_light+0xea/0x290 [ 2554.595194] do_writev+0x139/0x300 [ 2554.596115] ? vfs_writev+0x620/0x620 [ 2554.597116] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2554.598499] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2554.599849] do_syscall_64+0x33/0x40 [ 2554.600819] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2554.602178] RIP: 0033:0x7f952207fb19 [ 2554.603163] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2554.607978] RSP: 002b:00007f951f5f5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2554.610005] RAX: ffffffffffffffda RBX: 00007f9522192f60 RCX: 00007f952207fb19 [ 2554.611862] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 000000000000000a [ 2554.613710] RBP: 00007f951f5f51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2554.615635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2554.617505] R13: 00007ffd2a29b96f R14: 00007f951f5f5300 R15: 0000000000022000 20:14:55 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00') unlinkat(r1, &(0x7f00000001c0)='./file0\x00', 0x200) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000340)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0xa400, 0x110) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f0000001900)="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", 0x18a, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:55 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x9b, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:14:55 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x0, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:14:55 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 15) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2554.780938] loop2: detected capacity change from 0 to 512 [ 2554.788919] loop1: detected capacity change from 0 to 33559552 [ 2554.795572] EXT4-fs (loop2): unable to read superblock [ 2554.864392] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2554.864392] program syz-executor.1 not setting count and/or reply_len properly [ 2554.866358] FAULT_INJECTION: forcing a failure. [ 2554.866358] name failslab, interval 1, probability 0, space 0, times 0 [ 2554.867981] CPU: 1 PID: 13720 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2554.868772] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2554.869704] Call Trace: [ 2554.870014] dump_stack+0x107/0x167 [ 2554.870426] should_fail.cold+0x5/0xa [ 2554.870854] ? prep_compound_page+0x295/0x3c0 [ 2554.871359] ? create_object.isra.0+0x3a/0xa20 [ 2554.871876] should_failslab+0x5/0x20 [ 2554.872306] kmem_cache_alloc+0x5b/0x310 [ 2554.872761] ? prep_new_page+0x159/0x1d0 [ 2554.873220] create_object.isra.0+0x3a/0xa20 [ 2554.873713] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2554.874296] __kmalloc+0x16e/0x390 [ 2554.874707] blk_rq_map_user_iov+0x2aa/0x1a60 [ 2554.875219] ? sg_common_write.constprop.0+0x992/0x1a30 [ 2554.875817] ? sg_write.part.0+0x69e/0xaa0 [ 2554.876293] ? sg_write+0x87/0x120 [ 2554.876700] ? blk_rq_unmap_user+0x750/0x750 [ 2554.877203] ? find_held_lock+0x2c/0x110 [ 2554.877662] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2554.878271] ? lock_downgrade+0x6d0/0x6d0 [ 2554.878737] ? import_single_range+0x24d/0x2e0 [ 2554.879254] blk_rq_map_user+0x103/0x170 [ 2554.879712] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2554.880246] ? alloc_pages_current+0x18f/0x280 [ 2554.880765] ? sg_build_indirect.isra.0+0x448/0x710 [ 2554.881336] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2554.881943] ? sg_build_indirect.isra.0+0x710/0x710 [ 2554.882506] ? vprintk_func+0x93/0x140 [ 2554.882948] ? record_print_text.cold+0x16/0x16 [ 2554.883474] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2554.884045] ? trace_hardirqs_on+0x5b/0x180 [ 2554.884540] sg_write.part.0+0x69e/0xaa0 [ 2554.885000] ? sg_new_write.isra.0+0x770/0x770 [ 2554.885519] ? find_held_lock+0x2c/0x110 [ 2554.885989] ? __might_fault+0xd3/0x180 [ 2554.886437] ? lock_downgrade+0x6d0/0x6d0 [ 2554.886914] ? _cond_resched+0x10/0x30 [ 2554.887353] ? inode_security+0x107/0x140 [ 2554.887819] ? avc_policy_seqno+0x9/0x70 [ 2554.888277] ? selinux_file_permission+0x92/0x520 [ 2554.888823] sg_write+0x87/0x120 [ 2554.889209] do_iter_write+0x4f0/0x700 [ 2554.889693] ? import_iovec+0x83/0xb0 [ 2554.890135] vfs_writev+0x1ae/0x620 [ 2554.890549] ? vfs_iter_write+0xa0/0xa0 [ 2554.890997] ? __fget_files+0x2cf/0x520 [ 2554.891445] ? lock_downgrade+0x6d0/0x6d0 [ 2554.891909] ? find_held_lock+0x2c/0x110 [ 2554.892367] ? ksys_write+0x12d/0x260 [ 2554.892802] ? __fget_files+0x2f8/0x520 [ 2554.893255] ? __fget_light+0xea/0x290 [ 2554.893696] do_writev+0x139/0x300 [ 2554.894110] ? vfs_writev+0x620/0x620 [ 2554.894540] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2554.895130] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2554.895709] do_syscall_64+0x33/0x40 [ 2554.896132] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2554.896714] RIP: 0033:0x7f952207fb19 [ 2554.897132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2554.899214] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2554.900071] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2554.900874] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2554.901673] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2554.902484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2554.903294] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:15:14 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x48, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:15:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:15:14 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 16) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:15:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:15:14 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x20010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_CLOSE={0x13, 0x4}, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2574.475714] blktrace: Concurrent blktraces are not allowed on loop14 [ 2574.494483] loop1: detected capacity change from 0 to 33559552 20:15:14 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x80fe, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:15:14 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x0, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:15:14 executing program 2: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'wlan1\x00', 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00') sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x401004}, 0xc, &(0x7f0000001900)={&(0x7f0000000840)={0x38, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @val={0x8, 0x3, r0}, @void}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x5, 0x39}}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r2}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x48080}, 0x40090) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fffffff}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x313}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0x2290400, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x8, 0x1, &(0x7f0000000540)=[{&(0x7f00000003c0)="0f53ef8c8530fe34184e7164aa4b62ab83a32a8f44ac6d18f4e3ad77bba02f47c702ef2c79b06726ac94b25e460fe9dbf2c9ef625d2291450547f5bab47667ea8d3eeaf2b5390eeedc21d6a3c11b5c984446a591d193b2fae8d7740c06bd7145d1710826c1e3e5c34255a3bdb85ee2528013dd5567528af8aa7e165184bbfe0a9a9034872f9e32355516ad35c7cdc919f8952206ad1f2f0d0c1a989b78d346d965cb2da01312d3b1dcd0658d71b41292488db0aca722788633d0da2cd389136a84841205a39911b23931f1a8717349da", 0xd0, 0x9}], 0x900000, &(0x7f0000000580)={[{@nodots}], [{@obj_role}, {@uid_lt={'uid<', 0xee01}}]}) 20:15:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2574.626536] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2574.626536] program syz-executor.1 not setting count and/or reply_len properly [ 2574.652980] FAULT_INJECTION: forcing a failure. [ 2574.652980] name failslab, interval 1, probability 0, space 0, times 0 [ 2574.655499] CPU: 1 PID: 13750 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2574.656939] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2574.658673] Call Trace: [ 2574.659225] dump_stack+0x107/0x167 [ 2574.659989] should_fail.cold+0x5/0xa [ 2574.660790] ? bio_alloc_bioset+0x3b7/0x600 [ 2574.661703] should_failslab+0x5/0x20 [ 2574.662505] __kmalloc+0x72/0x390 [ 2574.663234] bio_alloc_bioset+0x3b7/0x600 [ 2574.664103] ? bvec_alloc+0x2f0/0x2f0 [ 2574.664899] ? kasan_unpoison_shadow+0x33/0x50 [ 2574.665852] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2574.666926] blk_rq_map_user_iov+0x473/0x1a60 [ 2574.667868] ? sg_common_write.constprop.0+0x992/0x1a30 [ 2574.668975] ? sg_write.part.0+0x69e/0xaa0 [ 2574.669868] ? blk_rq_unmap_user+0x750/0x750 [ 2574.670808] ? find_held_lock+0x2c/0x110 [ 2574.671665] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2574.672777] ? lock_downgrade+0x6d0/0x6d0 [ 2574.673713] ? import_single_range+0x24d/0x2e0 [ 2574.674680] blk_rq_map_user+0x103/0x170 [ 2574.675530] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2574.676524] ? alloc_pages_current+0x18f/0x280 [ 2574.677478] ? sg_build_indirect.isra.0+0x448/0x710 [ 2574.678544] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2574.679647] ? sg_build_indirect.isra.0+0x710/0x710 [ 2574.680692] ? vprintk_func+0x93/0x140 [ 2574.681507] ? record_print_text.cold+0x16/0x16 [ 2574.682491] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2574.683541] ? trace_hardirqs_on+0x5b/0x180 [ 2574.684449] sg_write.part.0+0x69e/0xaa0 [ 2574.685298] ? sg_new_write.isra.0+0x770/0x770 [ 2574.686266] ? find_held_lock+0x2c/0x110 [ 2574.687119] ? __might_fault+0xd3/0x180 [ 2574.687977] ? lock_downgrade+0x6d0/0x6d0 [ 2574.688862] ? _cond_resched+0x10/0x30 [ 2574.689673] ? inode_security+0x107/0x140 [ 2574.690546] ? avc_policy_seqno+0x9/0x70 [ 2574.691393] ? selinux_file_permission+0x92/0x520 [ 2574.692409] sg_write+0x87/0x120 [ 2574.693118] do_iter_write+0x4f0/0x700 [ 2574.693940] ? import_iovec+0x83/0xb0 [ 2574.694748] vfs_writev+0x1ae/0x620 [ 2574.695512] ? vfs_iter_write+0xa0/0xa0 [ 2574.696339] ? __fget_files+0x2cf/0x520 [ 2574.697174] ? lock_downgrade+0x6d0/0x6d0 [ 2574.698040] ? find_held_lock+0x2c/0x110 [ 2574.698890] ? ksys_write+0x12d/0x260 [ 2574.699688] ? __fget_files+0x2f8/0x520 [ 2574.700522] ? __fget_light+0xea/0x290 [ 2574.701337] do_writev+0x139/0x300 [ 2574.702086] ? vfs_writev+0x620/0x620 [ 2574.702881] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2574.703973] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2574.705047] do_syscall_64+0x33/0x40 [ 2574.705832] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2574.706901] RIP: 0033:0x7f952207fb19 [ 2574.707674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2574.711534] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2574.713120] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2574.714608] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2574.716088] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2574.717574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2574.719076] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:15:15 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66b2fd3b182027202820202920fa2925252c5e200a0edb1798722eea2ae4e4c5bd5b5f9725aae061e5419c10a0"], 0x27) setresuid(0xffffffffffffffff, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x5) linkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1000) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:15:15 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2574.896889] blktrace: Concurrent blktraces are not allowed on loop14 20:15:15 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x0, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:15:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 17) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:15:15 executing program 3: stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x8, 0x4000010, 0xffffffffffffffff, 0x0) r2 = mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x10010, 0xffffffffffffffff, 0x10000000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {r3, r4/1000+60000}}, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x5, 0x0, 0x0, 0x0, &(0x7f0000ff3000/0x3000)=nil, 0x3000, 0x0, 0x0, {0x0, r5}}, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SEND={0x1a, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)="5dfd1a8e697551d6d66423", 0xb, 0x10, 0x0, {0x0, r5}}, 0x6) r6 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) r10 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r7, 0x0) syz_io_uring_submit(r10, r9, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r11 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000380), 0x1000c2, 0x0) syz_io_uring_submit(r10, r2, &(0x7f0000000280)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x200000001000, &(0x7f0000000240)=[r11, 0xffffffffffffffff, r6], 0x3, 0x0, 0x0, {0x0, r5}}, 0x3) r12 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r12, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000340)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x5, 0x0, r13, &(0x7f0000000300)={0x4}, r7, 0x3, 0x0, 0x1, {0x0, r5}}, 0x80000000) 20:15:15 executing program 2: r0 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f00000001c0)=0x1) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d03fb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2575.149263] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2575.149263] program syz-executor.1 not setting count and/or reply_len properly [ 2575.180140] FAULT_INJECTION: forcing a failure. [ 2575.180140] name failslab, interval 1, probability 0, space 0, times 0 [ 2575.182614] CPU: 0 PID: 13785 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2575.184068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2575.185779] Call Trace: [ 2575.186340] dump_stack+0x107/0x167 [ 2575.187094] should_fail.cold+0x5/0xa [ 2575.187883] ? create_object.isra.0+0x3a/0xa20 [ 2575.188826] should_failslab+0x5/0x20 [ 2575.189613] kmem_cache_alloc+0x5b/0x310 [ 2575.190466] create_object.isra.0+0x3a/0xa20 [ 2575.191372] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2575.192417] __kmalloc+0x16e/0x390 [ 2575.193149] bio_alloc_bioset+0x3b7/0x600 [ 2575.193999] ? bvec_alloc+0x2f0/0x2f0 [ 2575.194786] ? kasan_unpoison_shadow+0x33/0x50 [ 2575.195728] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2575.196776] blk_rq_map_user_iov+0x473/0x1a60 [ 2575.197705] ? sg_common_write.constprop.0+0x992/0x1a30 [ 2575.198811] ? sg_write.part.0+0x69e/0xaa0 [ 2575.199699] ? blk_rq_unmap_user+0x750/0x750 [ 2575.200614] ? find_held_lock+0x2c/0x110 [ 2575.201458] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2575.202561] ? lock_downgrade+0x6d0/0x6d0 [ 2575.203416] ? import_single_range+0x24d/0x2e0 [ 2575.204360] blk_rq_map_user+0x103/0x170 [ 2575.205211] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2575.206195] ? alloc_pages_current+0x18f/0x280 [ 2575.207136] ? sg_build_indirect.isra.0+0x448/0x710 [ 2575.208171] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2575.209264] ? sg_build_indirect.isra.0+0x710/0x710 [ 2575.210293] ? vprintk_func+0x93/0x140 [ 2575.211101] ? record_print_text.cold+0x16/0x16 [ 2575.212057] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2575.213104] ? trace_hardirqs_on+0x5b/0x180 [ 2575.214007] sg_write.part.0+0x69e/0xaa0 [ 2575.214864] ? sg_new_write.isra.0+0x770/0x770 [ 2575.215809] ? find_held_lock+0x2c/0x110 [ 2575.216645] ? __might_fault+0xd3/0x180 [ 2575.217464] ? lock_downgrade+0x6d0/0x6d0 [ 2575.218351] ? _cond_resched+0x10/0x30 [ 2575.219144] ? inode_security+0x107/0x140 [ 2575.219998] ? avc_policy_seqno+0x9/0x70 [ 2575.220830] ? selinux_file_permission+0x92/0x520 [ 2575.221813] sg_write+0x87/0x120 [ 2575.222509] do_iter_write+0x4f0/0x700 [ 2575.223319] ? import_iovec+0x83/0xb0 [ 2575.224138] vfs_writev+0x1ae/0x620 [ 2575.224880] ? vfs_iter_write+0xa0/0xa0 [ 2575.225691] ? __fget_files+0x2cf/0x520 [ 2575.226506] ? lock_downgrade+0x6d0/0x6d0 [ 2575.227345] ? find_held_lock+0x2c/0x110 [ 2575.228181] ? ksys_write+0x12d/0x260 [ 2575.228961] ? __fget_files+0x2f8/0x520 [ 2575.229775] ? __fget_light+0xea/0x290 [ 2575.230582] do_writev+0x139/0x300 [ 2575.231311] ? vfs_writev+0x620/0x620 [ 2575.232086] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2575.233154] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2575.234205] do_syscall_64+0x33/0x40 [ 2575.234964] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2575.236013] RIP: 0033:0x7f952207fb19 [ 2575.236766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2575.240520] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2575.242089] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2575.243552] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000007 [ 2575.245010] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2575.246478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2575.247933] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:15:15 executing program 3: stat(&(0x7f0000000000)='./file1\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x2000, 0xffffffffffffffff, 0x0) 20:15:15 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x68, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2575.312352] blktrace: Concurrent blktraces are not allowed on loop14 20:15:27 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x9400, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:15:27 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:15:27 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x400, 0x20) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x84180, 0x1fa) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:15:27 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 18) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:15:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:15:27 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:15:27 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) chdir(&(0x7f0000000000)='./file0\x00') setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:15:27 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x0, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2587.350129] loop1: detected capacity change from 0 to 33559552 [ 2587.356463] blktrace: Concurrent blktraces are not allowed on loop14 [ 2587.420961] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2587.420961] program syz-executor.1 not setting count and/or reply_len properly [ 2587.423510] FAULT_INJECTION: forcing a failure. [ 2587.423510] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2587.425045] CPU: 0 PID: 13829 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2587.425923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2587.426959] Call Trace: [ 2587.427291] dump_stack+0x107/0x167 [ 2587.427749] should_fail.cold+0x5/0xa [ 2587.428220] copy_page_from_iter+0x40a/0x900 [ 2587.428784] blk_rq_map_user_iov+0x138b/0x1a60 [ 2587.429359] ? blk_rq_unmap_user+0x750/0x750 [ 2587.429914] ? find_held_lock+0x2c/0x110 [ 2587.430454] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2587.431123] ? lock_downgrade+0x6d0/0x6d0 [ 2587.431633] ? import_single_range+0x24d/0x2e0 [ 2587.432198] blk_rq_map_user+0x103/0x170 [ 2587.432689] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2587.433279] ? alloc_pages_current+0x18f/0x280 [ 2587.433854] ? sg_build_indirect.isra.0+0x448/0x710 [ 2587.434475] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2587.435130] ? sg_build_indirect.isra.0+0x710/0x710 [ 2587.435735] ? vprintk_func+0x93/0x140 [ 2587.436226] ? record_print_text.cold+0x16/0x16 [ 2587.436861] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2587.437489] ? trace_hardirqs_on+0x5b/0x180 [ 2587.438025] sg_write.part.0+0x69e/0xaa0 [ 2587.438540] ? sg_new_write.isra.0+0x770/0x770 [ 2587.439112] ? find_held_lock+0x2c/0x110 [ 2587.439620] ? __might_fault+0xd3/0x180 [ 2587.440115] ? lock_downgrade+0x6d0/0x6d0 [ 2587.440638] ? _cond_resched+0x10/0x30 [ 2587.441119] ? inode_security+0x107/0x140 [ 2587.441633] ? avc_policy_seqno+0x9/0x70 [ 2587.442144] ? selinux_file_permission+0x92/0x520 [ 2587.442752] sg_write+0x87/0x120 [ 2587.443175] do_iter_write+0x4f0/0x700 [ 2587.443647] ? import_iovec+0x83/0xb0 [ 2587.444126] vfs_writev+0x1ae/0x620 [ 2587.444577] ? vfs_iter_write+0xa0/0xa0 [ 2587.445059] ? __fget_files+0x2cf/0x520 [ 2587.445555] ? lock_downgrade+0x6d0/0x6d0 [ 2587.446053] ? find_held_lock+0x2c/0x110 [ 2587.446574] ? ksys_write+0x12d/0x260 [ 2587.447038] ? __fget_files+0x2f8/0x520 [ 2587.447542] ? __fget_light+0xea/0x290 [ 2587.448034] do_writev+0x139/0x300 [ 2587.448483] ? vfs_writev+0x620/0x620 [ 2587.448969] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2587.449628] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2587.450283] do_syscall_64+0x33/0x40 [ 2587.450755] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2587.451395] RIP: 0033:0x7f952207fb19 [ 2587.451845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2587.454142] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2587.455100] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2587.455961] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2587.456853] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2587.457723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2587.458624] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:15:27 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f707265666978a5fc4060cfc28a1d4029214800212c6f626a5f726f6c653d2c2f273a27405b262c7065726f2c726f6f74636f6e746578743d73797361646d5f752c6d6561737572652c736d61636b66736465663d6367726f7570002c0020b6e6a977bd49c89dfe6042b8e3bcca9451bcfff178207e0ca04cd0b602726433e98297a5376951c8c7999757bf397c3acf0acad9"]) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) renameat(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00') fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1) ioctl$RTC_VL_CLR(r1, 0x7014) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:15:28 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x6, &(0x7f0000001340)=[{&(0x7f0000000080)="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", 0x1000, 0x1}, {&(0x7f0000001080)="a7b5472eda2ebc6380b35c0c13ac2b3130b3eec9579b12a39df8e5f0b2ab0cb61d24330b5182192578f56d1dece0247db8db84953bb4c1176347cc1a4f4b1516531a4102a956341b7f3b9a1407392b73534f8046ec03aba5526a33626a4c0a3a1ebc4cb6d6cb071f606dc0c84a28f378f69f6fda746f5f860b61a54308c999fe7b3652ff21368712", 0x88, 0x7}, {&(0x7f0000001140)="69e3ee7a22a74036077a87beb56af8d6147f0a77f1de81717fef7c7d8eeef7a505cf802b7e4c741f0d27b1249ddb7c328b0a47e8466c0802da59f39b68f35633e810c9ed357d974053d98c8ff913d13a1e", 0x51, 0x8}, {&(0x7f00000011c0)="1618327094c6599f4020d345c48fb1fbd916e874344e352c2f6a1913683833399be28681e4961922086424a047b170c2f38496f7c70987a95a6fe37b385676e5a1ced8d33dc086f528bcbf30a71d50fdbde84e9e5b081ec6ed8af0af3f194c591c58376c52e0a5b7357ef1283ac22e8cc6d50e5fe8d6009031494fe205a64b1b3db7293c02ef9d05570bccaae58bb77f82f853e2abf2fae6579e114702", 0x9d, 0x20}, {&(0x7f0000001e00)="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", 0x1000, 0xe}, {&(0x7f0000001280)="8a125e7d4f390a49255cdb40113d9897c2c463540392249cd5ef64672ad9db93d1596a44899bedf6607f059e76a2492d87f95ea53059cabef5940af770d54d6d09e0d37db7aa936099ef3d33b962b3fd1b5e499e2b263b08e132f05b29eae775042924b1549d88087d8bc9891e7407f42369ef04c8170e025d59bf633ab0d6cd4a591ccfc1ceb568999819552248cb1450846e8e6395a7109385ab91b31e1400eb6394a2f052a220cd8d9cd6eadbeb7d", 0xb0, 0x6}], 0x440, &(0x7f0000001400)={[{@fat=@usefree}, {@numtail}, {@utf8}, {@shortname_winnt}, {@rodir}], [{@audit}]}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:15:28 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000880)=""/4096, 0x1000) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r0, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:15:28 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x0, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:15:28 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x74, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:15:28 executing program 2: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000580)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6gre0\x00', 0x0, 0x4, 0x3f, 0x1f, 0x0, 0x40, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x80, 0x87af, 0x1, 0xfffffffd}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000540)={'ip6gre0\x00', &(0x7f0000000440)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x6, 0x2, 0x39, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x20, 0x20, 0x7fff, 0x59}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'batadv0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001bc0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001b80)={&(0x7f0000001900)={0x270, 0x0, 0x4, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x7c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4c, 0x4, [{0x5, 0x7b, 0xde, 0xfffffffb}, {0x67, 0x0, 0x1, 0x9b}, {0x4, 0x81, 0x68, 0x269}, {0x2, 0x0, 0x95, 0xfffffff9}, {0x4, 0x8, 0x9, 0x4}, {0x9, 0x5, 0x5, 0x6}, {0x6, 0x7, 0x9, 0x800}, {0x5, 0x0, 0x4}, {0x200, 0x2, 0x8, 0x7}]}}}]}}, {{0x8, 0x1, r2}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0xc0, 0x2, 0x0, 0x1, [{0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7f}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}]}, 0x270}, 0x1, 0x0, 0x0, 0x4040}, 0x50) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2587.621211] loop3: detected capacity change from 0 to 4096 [ 2587.632697] FAT-fs (loop3): Unrecognized mount option "audit" or missing value 20:15:28 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 19) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2587.778955] loop1: detected capacity change from 0 to 33559552 [ 2587.874276] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2587.874276] program syz-executor.1 not setting count and/or reply_len properly [ 2587.876326] FAULT_INJECTION: forcing a failure. [ 2587.876326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2587.877785] CPU: 0 PID: 13863 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2587.878613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2587.879576] Call Trace: [ 2587.879889] dump_stack+0x107/0x167 [ 2587.880377] should_fail.cold+0x5/0xa [ 2587.880830] copy_page_from_iter+0x40a/0x900 [ 2587.881366] blk_rq_map_user_iov+0x138b/0x1a60 [ 2587.881912] ? blk_rq_unmap_user+0x750/0x750 [ 2587.882443] ? find_held_lock+0x2c/0x110 [ 2587.882932] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2587.883560] ? lock_downgrade+0x6d0/0x6d0 [ 2587.884033] ? import_single_range+0x24d/0x2e0 [ 2587.884576] blk_rq_map_user+0x103/0x170 [ 2587.885052] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2587.885606] ? alloc_pages_current+0x18f/0x280 [ 2587.886135] ? sg_build_indirect.isra.0+0x448/0x710 [ 2587.886738] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2587.887348] ? sg_build_indirect.isra.0+0x710/0x710 [ 2587.887941] ? vprintk_func+0x93/0x140 [ 2587.888404] ? record_print_text.cold+0x16/0x16 [ 2587.888952] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2587.889538] ? trace_hardirqs_on+0x5b/0x180 [ 2587.890054] sg_write.part.0+0x69e/0xaa0 [ 2587.890538] ? sg_new_write.isra.0+0x770/0x770 [ 2587.891084] ? find_held_lock+0x2c/0x110 [ 2587.891557] ? __might_fault+0xd3/0x180 [ 2587.892017] ? lock_downgrade+0x6d0/0x6d0 [ 2587.892506] ? _cond_resched+0x10/0x30 [ 2587.892962] ? inode_security+0x107/0x140 [ 2587.893439] ? avc_policy_seqno+0x9/0x70 [ 2587.893917] ? selinux_file_permission+0x92/0x520 [ 2587.894483] sg_write+0x87/0x120 [ 2587.894878] do_iter_write+0x4f0/0x700 [ 2587.895339] ? import_iovec+0x83/0xb0 [ 2587.895784] vfs_writev+0x1ae/0x620 [ 2587.896211] ? vfs_iter_write+0xa0/0xa0 [ 2587.896675] ? __fget_files+0x2cf/0x520 [ 2587.897134] ? lock_downgrade+0x6d0/0x6d0 [ 2587.897617] ? find_held_lock+0x2c/0x110 [ 2587.898086] ? ksys_write+0x12d/0x260 [ 2587.898545] ? __fget_files+0x2f8/0x520 [ 2587.899010] ? __fget_light+0xea/0x290 [ 2587.899465] do_writev+0x139/0x300 [ 2587.899878] ? vfs_writev+0x620/0x620 [ 2587.900330] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2587.900953] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2587.901554] do_syscall_64+0x33/0x40 [ 2587.901987] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2587.902600] RIP: 0033:0x7f952207fb19 [ 2587.903030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2587.905185] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2587.906073] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2587.906942] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2587.907787] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2587.908623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2587.909466] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:15:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x5000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:15:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000880)=""/4096, 0x1000) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r0, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:15:43 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 20) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:15:43 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:15:43 executing program 3: setresuid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:15:43 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x0, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:15:43 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x3, 0x7, &(0x7f0000001c40)=[{&(0x7f0000000440)='#*', 0x2, 0x6}, {&(0x7f0000001900)="63c6f439d4b59cadc0bb1342c0f4f98536acebd233c3ffe6cecd95ef425906b2c56d864d38ed6a1aa3af5e36467a4ca069b9900317a5382af301e2349ad47f074b2029657b92c07134698af59beff092f0b2b04ba2bfa4d941340ca8afb7645cd5e98e45aa00cd4353cc77208044a467b8539638e75af4534cd02fea11e2bad2c820e3fd096e456ce7c7a21cc228d468a7f5b34f76bc8f9e718ad62df85a20b6ae18e00358b7a5ac80057dbf180909490e2ffdf96e7ae152fa5c9ff59c49719bbf67a766", 0xc4, 0x80000001}, {&(0x7f0000000800)="a566066b584aa1233ec34144e518632355c8ff2d3ea626afa96f90b5f5c301c4fe5c7fbadee65da34ff6aa24929d79b7551cc7786267993be88c88e91989c5f380e50a04db7f683cd5cd5b997695276a1c1566930ce29d008180f483151c789c42c4d8f33315135c0daed9085dbe3394", 0x70, 0x6982}, {&(0x7f0000001a00)="469170bb522158c5d3f594e7893b6fe3c01def2672a0377aecdadae710e9f85be07813ab47c744eb8f0040f09a3a4b59f0f19ad2edcf39417e818bbf957434a7b664009c8671a4b1adf9d96721ee49cf6d55ecd42816934589df68b4693e7a841c8c46c256e7ef0b9abb69b2080b08abb3b481ec532490f9a91ecad84666975c8ad5bd363485a10c49bf3d68c2fc205bcc1059e8f90456bea228e292421a0c0390447af47b90d832e34400b12da2d53d5247ee702706377cee1f177a1e22ff7a913b733bb8a9adca50d39ee3b0a93db3189d09ad6af98d2de516df9722f3234e78dfebed9c6119dae6cb42137b9a3b845738", 0xf2, 0x6a}, {&(0x7f0000001e00)="6ad2cb4f4e5e2dce26d3d6f5b2b2216ab8fdb0f566a9de2228877ee6bc8bc72e699c26e8309ed360b01a6c266e26d8ad0eab0fd0c729756855044e7a0959164e78dd0555ee094f28e04d3970a3fb0f85a365cd9f28a998989a700579f0d1d65e55f9e1607d38f74b88c318a983f73a2a0a730d18bcb92834f57aba44c5f5290014b3d54e5c782ad50131f78c484c3f56b2333abae42cb9c0ce18ef57692d2dbd46d6086908226e2d1b11cd6cfeb45577594ed1b87d8e6772724f9c46864ac3475869d34f5642d007067a305046acec1986f4ff75fad630300f852a456c31f83ae27c86ed32dabd3e7952d1fff9852fb703d5e535683490420f43646046198df1f1bdea2bf1791b39387ea0e43c219a83a2bac97573e0fca7867cef9e6d141abba6a08a39de8032a415a86d88ea970b306b3e6a8181a634fbcbcd30d2ba7a0975ad8f2b0454dc45ed0498c8266d3d6e29aa868cde5e4bc882bc369012eb54f1563275a2c0e6b91a53eabcc8ca4ce566bee79069c5209b281dbd28fa93965ed2213bf36b69f835cdd37cbdbea6d3c535199b4ffe2f3e4e12fdc2d16a380bcad8ffec2767e270492c55473fbda005620794de351fd7d65d0f435532a513f5de1c09e097c956d409d42ac85a3ea7e042b4764f64727e020bc4bd5a2b0a29f96477c45fec8c5bffd09367659527378f2c6f61fcde9ce2b94333a6387da890a12167c1f91de2e9c6acae85be9f1b97438a193f1f9493277e38688b613eb51cd35c3814a1c4ba4306af54385f2f29baef41b2fd6b4fdd3d517c89df0e0e369b6e0176a2525f62b8f9609222982ce70bb985bc1df148cbb05b8c4fc530691a0ada933cd9fc75d6da3d8c19ee55932c42c40dbfa954e36a0969c5db42db69a384561414cf5b0e799964f4fbd938294f68ba6e0be0cc4ac432926e9d23d8ca37c8ffea14aef7a0a5ec398e76f34bfb410d331a507b65b9c7908b08e2c7c54db8ad72dcc15d8ec0959d10cda897066edb290b2f08267cedb0860ffc3ec9a4829f049c0a42c92925b2cef62de1c6ee51b7537638bb29f79aa67188b891617f54ed9164bceab5380447a50528704fb806e9a744f698c110cbd55f772d1e21d45ae5a2e206d272a8f2e3e96a4e406f05918efcc8bf75be09a13ab41937df64bd8a7596ece77b957af23c10180fbb0332e00d2f209db979783795caec8aa3a166fc8c2d244677aedadb73bc2a76c68744d14e572c7416de93c5eb49bb3934a06a45319957dec8654ade1c49899c69f1eb49f28e1b6144800ec58ffb4098efc6a668fc09e3c3e4b970f84e180fd85ba1bba0f1a4066d13be34847e03380110332adb0e2d62257183f0077aad4aa55bcd848e180593d89aa9eef785b63839ea66c001027188de51431ae756a8bbddd0ba86632873c9d224dd182854f11c092aa398588ac31e4e37a7515f7c16bab50ed8a13df4f2f46c50c9eb58dc1e02146bc6815d19df8560007859d921a9694b57e77c1302c6e4977c21d61a70e6f52f0b9b9a0fba87603f83d5ab96fd3984ad9f44f9e5c105c35b49777317d4f6534bb5f380db70af51885fb2975a215b779b0f61408194cfb83e8596426d03f2f5920127c6faed22b36489b8a34d08f2f80f7193d094ff21da0adc34b5281c6ec5137c78ff21e4608f920396df707d895cd2bb87f38d73b58fa0e0d5023ba9aaa45f9e8c0bd6abcb38424610340a5ebb9052ef66c6561ed23a22cfc5665a10e47326e8373627126e1aa8a8f5b76791e9aa3412228f0f6abce093bf1e8ede1ae9165800a885be2c285dde801b7dbd148d7f93fc769fd966bedd6ec99c6118f0081e9c7cd42659ea67ceb5c9df8980f5ecebabac71355c87250f8e867c66095f31a6a815fc691b179fd02760a64689e96713d6f5faec526230c01c697b70520785f2160e1f99e77726c1ad11817cbbbcda1ec49b6df96a82b4a6e9496f7e6cba988996bce3bc252376d68ab12e8826576d40350107b954f6b6e129239259dd01222ad8732f1d452beb09569f5626f139347d8016af590d5104fd480c7cce753b6a13ff7321847fbb98fc064ebbb076f8d3206be7e35d5a2dd73f4f21dad61f5419f5c4f25aabf8f075b0038719a483a39a81dd17d38028b52ed05e28b6ba4762d1829afbb98b8c194d7fc44d2f17ddf629c272fabc4976633296719cb59ffcc14c8e8fc62752ae06c8e34ef1b9a4dcc63aae7a6a01623e5f7e3f695fb7d60f362e25d6116c7337ce0f0361d2a164bdb21a0e76639c5f928fe171f40479ce9b7a05703e7a8d527715817ff7c3badbec68c23a00eeaf5c8eda6b921276fcd959d9bfef898b1ccb134a0714a662a3489f1624e4e07d38f7beeb080d53ac8849f90d4c9c4cd09c1674db57f565fecf29561786cfc91d6d15df4aee4752ce136dfbe78d803374978ac9bca28d5dfba3d6efd0b2052361b4a3194f74d6829c9128b468ed662293addd4b7ce13cc907c527df124d296758c2eeab19ca7f8c373d42c0f169adfd5617f5658845c1d4f5082738d1bfa43e21ee47ff42a8ed60994f6bc0879b8961ff0593f4419b75dc82d1c0feb8529f7ef68d7d708041eab2135714b5c0396196b2a02874ac7926e85e161f68f9e16338f9a17cddf3aea3c28060807fa7c9730f1ee85a8cbbecbff2108237e329fa986db51a67b835f2ef489425d3cbf4875fb7d4140947f5a9215cf1007dcf45c56a9bfbc07853385a959b23c9aca8d1bdccf9dde7540e5dbc2f6ef9f311326021239246bdee79a59c735fe06e2130dc099cdee8b7558c050c9b58d44ace2ad506511ba16d020d7d638cd7cc791091875948c2071ed9c68f25ff87b124b88022a92367294c01d4015d0a605c61a329023c269d9776081a9722211ee35e2e7bf46feac4acaf24466a868dcd50c37d62a3e4bf175fa66d03973eaf3c1c4ac66494a80770445d60c1cc81ea97b658f01518ad1691d9a2866de5314472ccb7dab84f4117796932c9dea37cd84f9e195d823a7b7b5ef1842d962b7372f0f2973e76a86a3b6dcc675fbdbe515d5ca7af7ff82fb8895f9407c86e811941e00139019906a302c9b8365369c534128014c80fb3fe6b9b7c086ef747623cbc683d88865ec3e0332f963c7ae3efcfb034e7c88e8c38d1609d20993404fa24933719bb5b89f217098b8e44452ff8981f1255aea4a8e9c490dd376c804d14920aee7a151927b56c3ac5fbfedcc5cf9d78ac0ffa1dc5cdbff6f40440c0dd2bf7c3092f85b8baafd205440bac555208de75ef315159160875a25e5c3778e1e9f7e3887127b24d14a90820cb02bfbc776ec14bcd45fe2e51faca9a1e22a8dca2094bf25cde38026341156f53c84d9f3864be7baf0e78cc21fc3f6d905e9852236450cd57c5512e41deb99d4c38846f3f18d30c405e58c51232cc3b735f5ca159342ee02d68ae374bcf3680ed127748af6bcc543815eec2d36739b46ae1abffe2ec1c70973331089461a3951d844bebf605ff3cc8bd072e2736ef5218f0c935d0afc1c1b61eabb786d03f15b788526af7e96c285cec87501151cedea0988c3ad819f41012d27dea6d54608b9db0bfb8a8aa2e2db826bdeae4816517ac4f0c3a82fe0b729f212c7ee7f0513cb1f2ba65799f56a37850b594c34cb0eefb60385b5fa437493a007b2f1d5a9043cb5f44f64475cfb00281b83aa75d6b0f3ea5c94fe277f5727086c520d77562f4e620f6aa3aad69a753ff073a3e89dface55ce2e5c25982a1d9de8a6c3b0cc1ec1db5a502d8b131a190d528f41300f61943ba3c1baeee55f05606c2ed6e19a21198d420292243cbe4381e7dc6e56160102273805c79f4de980c13ce3d03ebe1a3e733bf4e7cba3bbb8af4b56b8410bf95194b1b765e68f6f1d40634b09963a4bbba77ae87862d0b69713616db701030d41c80f6d38438ca6e625e868df3131a8614f301526fea9a08d922857b5509d068f995f822f564126bb53f8580ca18b1fc542633fc0a3333f23a2dad644f478e72d6e6f7b4890dd7705fd3daa7abccd83f33419031f37eb68cf7dea864f3ad37c8b04cac59894f6449c51ba96da7e122660d1b6b99ec5a23056c8e4c92dfcd696634a6fd22a1fdb6992c0bb9b70c44ceea583baeeac43749b4f233f592e2de6a1d2495968ffabc3aa2c843223c9d1c21c21b0377b389703a2235553514e739b3c03341b0c2326e3527c37120e008fad0b4d86f13b8c1386f8da784dfef3a435871017f85e3b3cd889381db23f74a3dad0cce9ebb5a8f327537502ccc46e2659e181b171807bbb40d39d11f6e61aaa6901de694c9a63f508d028350205af52cc88467c0f3e43e8b5b313c0a2b1adcf99eeeed4580ee28f4a0db29bd6dadb7ba6bc9ed1d5c03accbf4ea10e5e533358f5c45fa2851ee9ef536345ce724ecf97aab78d7bf7b684be78fc95e75c816b95438d57970055404b87c1c7082068def0cf8cfb61a56ed97f7cdc226990d3382310a1a59ee0b77c2f8a12ee9e2a07d04bd32ca4b91960e8efb8183b46d6212ed7222367c688cdb05c96c3c24817eca9a092b6068e552592b7fe2aaa8fa750d894a2d9ae02aebea6f9c158927cbab5f6ae7a7b610ba55d51243d9496b31f11bfbfb307526a7815e94e56f1968a9d037f84056f1c70aba6a48e422cb3e121a3b60857637ec3b403b4b879946574ee553c30ab6b29166f0439a1de99a15528d2445d6cfafb8270f709f7a47e526f276af2a9c8fb83a08bcdf571fe575e25d6d06115c7626419ba4e231b835652027c05543666379c6f0fcd52669639892e37417ff1400bf6cd811ea53e5f068ece4f01e2089bc326a7193fab91724325bf603d1a6a1094df6e9176120cbea07f0d4fe5d7a10a3e10150a3958599680102c48a4c49dcfc650bdcc2898c458878625cd256c0243bd38229c2152a6a123158cdef25abbc6f397cd37e3fb44e854f39f48d55dbf2b06240de4d8de826354195e182b8a439d2fff1bfa5190d5cf7cb7d61c4d3fa6619540bbd377b1bcf87375d8be66d53190372f43ebe44da82075720732601741445aa789dfe73a981af5cb7782fee4e94bf8f22a41fb17b0aaa901ef541c8689e48d12f3e0ac23e270ec9c14ae9c0edd8a95d57f5624c12cc5635a2afa44f6cb075913d5aa360973ff106848e896bfcd383490d8f973b26b46be7e9b33d6944c898688060bd5076af172c7217ffcd17bf78a978eb5fbbee59f24df0c9a3bb8b126bf66a52ecc32c15b5faedd60733ecd7569d09523f428abccdc5e826b083c6f455d32486440d711b0fe7ed2a738baaf8fab444887dc6cea78783b45f5bde32a48c2554d3c116378111ace946280f87e50d0a514c560f8589551f24355e8775d7031e9187cd33158edfac39e074b1461c9d96bd98983c45870cacb9db5580777e796b584798e9c3bd2db0529680af4ca2ae26d464876e10bf0ad62763d89ad6f54acf49777a32f5545316c210103dc398136e79b09c9fa7ad4076729181e10144c970681160aa3034979448bceb04d4e2e761cc7e95efe7318548556ae24d76b38615b0fed231580f4e813976d782401477518f8fd05ccabe953e1fe9c72a6aa778b2b134cbb6dad4cfd5aa5dd0b5170138ac910e351d7b617ad522ae2c4b9a4f511d8e052866abee5560a85c3eb097c6b4c2ac367198f36184fccbde499315672b6525d78237ddf2dae379b83002803bf1830f6c34e2e121890280e7a3a3202ac70e5bf5e1dca8ed8a58e4ae82a863713c0ffa53105a799d0742090c3734d681f020bf7faec2a757b9647aa8", 0x1000, 0xfff}, {&(0x7f0000001b00)="4c38490d66a5dfec5ba2fd05ee0522f170944601a0b7aa1c7cd3a8f53b8fee91878eed20d17887e30ba4dded1f2bb02cb76e2fe59d0259ffd4fb04b6beae26553a2d388cb8086ebd5f181a8c60fecbf13f70968d3dc0845831e13542a8b9d0b04d3c03a06d767b3f3f2188e5a68f9a510e83d987568808a9b4021304cfa81481dd8231097185", 0x86, 0x2}, {&(0x7f0000001bc0)="06356fcc5c6d68fe63ac19291f1e995eac26414e1a17d63e13e6c68278302f34226986e7470b8ef613cbab61528d11a35085937190d03fcaac1d73bb14eb315cd5fb3061f7961c76d9881b907a77c8d0619a376c9976b2737e9431489db94561963f6181768984f46d7c98e22cd03634a83d467c6a", 0x75, 0x4}], 0x810, &(0x7f0000001d00)={[{@gid}, {@mode={'mode', 0x3d, 0x4199}}], [{@fowner_lt={'fowner<', 0xee01}}, {@appraise_type}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) gettid() r1 = getpid() waitid(0x0, r1, &(0x7f00000003c0), 0x2, &(0x7f0000000540)) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:15:43 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0xc0fe, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) [ 2603.472665] loop1: detected capacity change from 0 to 33559552 [ 2603.513737] blktrace: Concurrent blktraces are not allowed on loop14 [ 2603.525575] loop2: detected capacity change from 0 to 135266304 [ 2603.548995] tmpfs: Unknown parameter 'fowner<00000000000000060929' 20:15:44 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext, 0x1400, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x2) [ 2603.644025] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2603.644025] program syz-executor.1 not setting count and/or reply_len properly [ 2603.655208] FAULT_INJECTION: forcing a failure. [ 2603.655208] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2603.657868] CPU: 1 PID: 13880 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2603.659388] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2603.661202] Call Trace: [ 2603.661799] dump_stack+0x107/0x167 [ 2603.662613] should_fail.cold+0x5/0xa [ 2603.663461] copy_page_from_iter+0x40a/0x900 [ 2603.664442] blk_rq_map_user_iov+0x138b/0x1a60 [ 2603.665451] ? blk_rq_unmap_user+0x750/0x750 [ 2603.666418] ? find_held_lock+0x2c/0x110 [ 2603.667323] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2603.668466] ? lock_downgrade+0x6d0/0x6d0 [ 2603.669532] ? import_single_range+0x24d/0x2e0 [ 2603.670531] blk_rq_map_user+0x103/0x170 [ 2603.671551] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2603.672640] ? alloc_pages_current+0x18f/0x280 [ 2603.673697] ? sg_build_indirect.isra.0+0x448/0x710 [ 2603.674886] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2603.676130] ? sg_build_indirect.isra.0+0x710/0x710 [ 2603.677314] ? vprintk_func+0x93/0x140 [ 2603.678275] ? record_print_text.cold+0x16/0x16 [ 2603.679542] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2603.680836] ? trace_hardirqs_on+0x5b/0x180 [ 2603.681997] sg_write.part.0+0x69e/0xaa0 [ 2603.683123] ? sg_new_write.isra.0+0x770/0x770 [ 2603.684336] ? find_held_lock+0x2c/0x110 [ 2603.685435] ? __might_fault+0xd3/0x180 [ 2603.686472] ? lock_downgrade+0x6d0/0x6d0 [ 2603.687613] ? _cond_resched+0x10/0x30 [ 2603.688720] ? inode_security+0x107/0x140 [ 2603.689835] ? avc_policy_seqno+0x9/0x70 [ 2603.690888] ? selinux_file_permission+0x92/0x520 [ 2603.692155] sg_write+0x87/0x120 [ 2603.693057] do_iter_write+0x4f0/0x700 [ 2603.694074] ? import_iovec+0x83/0xb0 [ 2603.695066] vfs_writev+0x1ae/0x620 [ 2603.696017] ? vfs_iter_write+0xa0/0xa0 [ 2603.697232] ? __fget_files+0x2cf/0x520 [ 2603.698556] ? lock_downgrade+0x6d0/0x6d0 [ 2603.699845] ? find_held_lock+0x2c/0x110 [ 2603.701053] ? ksys_write+0x12d/0x260 [ 2603.702170] ? __fget_files+0x2f8/0x520 [ 2603.703361] ? __fget_light+0xea/0x290 [ 2603.704507] do_writev+0x139/0x300 [ 2603.705538] ? vfs_writev+0x620/0x620 [ 2603.706693] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2603.708308] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2603.709902] do_syscall_64+0x33/0x40 [ 2603.711062] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2603.712640] RIP: 0033:0x7f952207fb19 [ 2603.713787] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2603.719418] RSP: 002b:00007f951f5f5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2603.721735] RAX: ffffffffffffffda RBX: 00007f9522192f60 RCX: 00007f952207fb19 [ 2603.723918] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 000000000000000a [ 2603.726074] RBP: 00007f951f5f51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2603.728230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2603.730381] R13: 00007ffd2a29b96f R14: 00007f951f5f5300 R15: 0000000000022000 20:15:44 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1445, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:15:44 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x146, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:15:44 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r0, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:15:44 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 21) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2603.985498] blktrace: Concurrent blktraces are not allowed on loop14 20:15:44 executing program 3: setresuid(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x2a000, 0x10) mount$9p_rdma(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532302c667363616368652c666566636f6e746578743d756e636f6e66696e65645f752c66736d616769633d3078303030303030303030303030303030392c686173682c646f6e745f686173682c6f626a5f743eeb7970653d5c232f232c7375626a5f747970653d2c00"]) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='-/,\x00', &(0x7f0000000080)='\'!,/[\x00', &(0x7f00000000c0)='%\'}-\x00'], &(0x7f0000000240)=[&(0x7f0000000140)='/-!@\x00', &(0x7f0000000180)='%^t:}/\xe9-$:\'/\'@\\:\\^,$*\x00', &(0x7f00000001c0)='*^\x00', &(0x7f0000000200)='}.&{:\x00']) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 20:15:44 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x0, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:15:44 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x10000b, &(0x7f0000001880)=ANY=[]) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$nfs4(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x100, 0x2, &(0x7f0000000440)=[{&(0x7f00000003c0)="ee5ff49c2457fee2b5bd6946f98fdca5334a5d7e58995d699810b5ea680696ef82bfc4f3c651a5dc49ade0dbf51508ca40c2d81c3b6e4560a6ea277cd28bbc4d97c36a0b18acc3716b3e2405d3", 0x4d, 0x2}, {&(0x7f0000000540)="01e35aeed65bcfbd44c90f527cf19807d755e3fa8550d3b610ad4958355b0b2b74236e44115427f3d70770984d1b78fde3cddf574d76dd5170109e08be634b1c38da6484424ad357be950390e6c1dad3b79c431db0a266e8200fac1861332a658794c9f9df56477b5a175d0b6bafe58c94496205c18dbe3ce4c10707b54683b5f7ce48ff1b2560bd15f2", 0x8a, 0x2}], 0x2030400, &(0x7f0000001900)={[{'ext3\x00'}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@obj_user={'obj_user', 0x3d, 'uid>'}}, {@dont_appraise}, {@hash}, {@fowner_gt={'fowner>', r0}}, {@seclabel}, {@fsname={'fsname', 0x3d, '/.'}}, {@fowner_gt={'fowner>', 0xee00}}, {@dont_appraise}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x4, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}, 0x400, 0xfffffffffffffffe, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2604.114183] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2604.114183] program syz-executor.1 not setting count and/or reply_len properly [ 2604.122382] FAULT_INJECTION: forcing a failure. [ 2604.122382] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2604.125372] CPU: 0 PID: 13924 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2604.126916] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2604.128684] Call Trace: [ 2604.129270] dump_stack+0x107/0x167 [ 2604.130050] should_fail.cold+0x5/0xa [ 2604.130869] copy_page_from_iter+0x40a/0x900 [ 2604.131802] blk_rq_map_user_iov+0x138b/0x1a60 [ 2604.132800] ? blk_rq_unmap_user+0x750/0x750 [ 2604.133748] ? find_held_lock+0x2c/0x110 [ 2604.134636] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2604.135783] ? lock_downgrade+0x6d0/0x6d0 [ 2604.136670] ? import_single_range+0x24d/0x2e0 [ 2604.137651] blk_rq_map_user+0x103/0x170 [ 2604.138527] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2604.139547] ? alloc_pages_current+0x18f/0x280 [ 2604.140517] ? sg_build_indirect.isra.0+0x448/0x710 [ 2604.141583] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2604.142726] ? sg_build_indirect.isra.0+0x710/0x710 [ 2604.143784] ? vprintk_func+0x93/0x140 [ 2604.144607] ? record_print_text.cold+0x16/0x16 [ 2604.145612] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2604.146704] ? trace_hardirqs_on+0x5b/0x180 [ 2604.147772] sg_write.part.0+0x69e/0xaa0 [ 2604.148653] ? sg_new_write.isra.0+0x770/0x770 [ 2604.149967] ? find_held_lock+0x2c/0x110 [ 2604.150855] ? __might_fault+0xd3/0x180 [ 2604.151702] ? lock_downgrade+0x6d0/0x6d0 [ 2604.152613] ? _cond_resched+0x10/0x30 [ 2604.153429] ? inode_security+0x107/0x140 [ 2604.154318] ? avc_policy_seqno+0x9/0x70 [ 2604.155200] ? selinux_file_permission+0x92/0x520 [ 2604.156237] sg_write+0x87/0x120 [ 2604.156967] do_iter_write+0x4f0/0x700 [ 2604.157800] ? import_iovec+0x83/0xb0 [ 2604.158653] vfs_writev+0x1ae/0x620 [ 2604.159482] ? vfs_iter_write+0xa0/0xa0 [ 2604.160326] ? __fget_files+0x2cf/0x520 [ 2604.161171] ? lock_downgrade+0x6d0/0x6d0 [ 2604.162063] ? find_held_lock+0x2c/0x110 [ 2604.162947] ? ksys_write+0x12d/0x260 [ 2604.163760] ? __fget_files+0x2f8/0x520 [ 2604.164615] ? __fget_light+0xea/0x290 [ 2604.165604] do_writev+0x139/0x300 [ 2604.166399] ? vfs_writev+0x620/0x620 [ 2604.167244] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2604.168357] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2604.169450] do_syscall_64+0x33/0x40 [ 2604.170246] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2604.171354] RIP: 0033:0x7f952207fb19 [ 2604.172146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2604.176050] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2604.177664] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2604.179185] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000007 [ 2604.180708] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2604.182253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2604.183775] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:15:44 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r0, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:15:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:15:44 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x400}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 20:15:44 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r0, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:15:44 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x166, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2621.015516] loop1: detected capacity change from 0 to 33559552 20:16:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:16:01 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 22) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:16:01 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x1a9, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:16:01 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x9, 0x3f, 0x8, 0x8, 0x0, 0x5, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000000c0), 0x4}, 0x1080, 0x8, 0x400000, 0x6, 0x4cc, 0x4, 0x8, 0x0, 0xf9b3, 0x0, 0x9}, r1, 0x0, 0xffffffffffffffff, 0x9) readv(r2, &(0x7f00000016c0)=[{&(0x7f0000000200)=""/203, 0xcb}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001300)=""/114, 0x72}, {&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000001380)=""/209, 0xd1}, {&(0x7f0000001480)=""/125, 0x7d}, {&(0x7f0000001500)=""/129, 0x81}, {&(0x7f00000015c0)=""/232, 0xe8}], 0x9) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x51000, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x20, 0x3, 0x20, 0xf, 0x0, 0x800, 0x30, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x800, 0x1, @perf_config_ext={0x8, 0x3}, 0x40, 0x2, 0x80000001, 0x3, 0x3, 0xfffffffb, 0x8000, 0x0, 0x5, 0x0, 0x800000}, 0x0, 0x5, r3, 0xa) 20:16:01 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x0, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:01 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffff7e0000, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = gettid() kcmp(r0, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r2 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x82) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0xff, 0x1f, 0xe6, 0x1f, 0x0, 0xfff, 0x10020, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x4}, 0x2c13, 0x3, 0x3, 0x3, 0x4, 0xd00, 0x3, 0x0, 0x0, 0x0, 0x7f}, r0, 0x9, r2, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000440)={0x7f, 0x5, 0x1, 0x8}, 0x10) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57c876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@obj_role={'obj_role', 0x3d, 'grpjquota'}}]}) 20:16:01 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r0, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:01 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0xe803, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) [ 2621.030653] blktrace: Concurrent blktraces are not allowed on loop14 20:16:01 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x94a21, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1001000, &(0x7f0000000140)={[{@cpuset_v2_mode}, {@xattr}, {@xattr}, {@name={'name', 0x3d, '(:#)]'}}, {@name={'name', 0x3d, '+]/&\x10%{&%#&'}}], [{@obj_role}, {@uid_gt={'uid>', r0}}, {@fsname={'fsname', 0x3d, ','}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x38, 0x36, 0x65, 0x30, 0x65, 0x36], 0x2d, [0x65, 0x33, 0x64, 0x37], 0x2d, [0x35, 0x63, 0x31, 0x35], 0x2d, [0x66, 0x65, 0x37, 0x31], 0x2d, [0x62, 0x65, 0x61, 0x5, 0x64, 0x64, 0x30, 0x62]}}}]}) [ 2621.113189] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2621.113189] program syz-executor.1 not setting count and/or reply_len properly [ 2621.115514] FAULT_INJECTION: forcing a failure. [ 2621.115514] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2621.116885] CPU: 0 PID: 13983 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2621.117697] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2621.118602] Call Trace: [ 2621.118916] dump_stack+0x107/0x167 [ 2621.119336] should_fail.cold+0x5/0xa [ 2621.119780] copy_page_from_iter+0x40a/0x900 [ 2621.120293] blk_rq_map_user_iov+0x138b/0x1a60 [ 2621.120831] ? blk_rq_unmap_user+0x750/0x750 [ 2621.121337] ? find_held_lock+0x2c/0x110 [ 2621.121817] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2621.122435] ? lock_downgrade+0x6d0/0x6d0 [ 2621.122973] ? import_single_range+0x24d/0x2e0 [ 2621.123497] blk_rq_map_user+0x103/0x170 [ 2621.123936] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2621.124487] ? alloc_pages_current+0x18f/0x280 [ 2621.125011] ? sg_build_indirect.isra.0+0x448/0x710 [ 2621.125559] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2621.126168] ? sg_build_indirect.isra.0+0x710/0x710 [ 2621.126749] ? vprintk_func+0x93/0x140 [ 2621.127175] ? record_print_text.cold+0x16/0x16 [ 2621.127715] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2621.128267] ? trace_hardirqs_on+0x5b/0x180 [ 2621.128769] sg_write.part.0+0x69e/0xaa0 [ 2621.129240] ? sg_new_write.isra.0+0x770/0x770 [ 2621.129758] ? find_held_lock+0x2c/0x110 [ 2621.130242] ? __might_fault+0xd3/0x180 [ 2621.130702] ? lock_downgrade+0x6d0/0x6d0 [ 2621.131188] ? _cond_resched+0x10/0x30 [ 2621.131634] ? inode_security+0x107/0x140 [ 2621.132109] ? avc_policy_seqno+0x9/0x70 [ 2621.132586] ? selinux_file_permission+0x92/0x520 [ 2621.133149] sg_write+0x87/0x120 [ 2621.133548] do_iter_write+0x4f0/0x700 [ 2621.133999] ? import_iovec+0x83/0xb0 [ 2621.134438] vfs_writev+0x1ae/0x620 [ 2621.134869] ? vfs_iter_write+0xa0/0xa0 [ 2621.135321] ? __fget_files+0x2cf/0x520 [ 2621.135750] ? lock_downgrade+0x6d0/0x6d0 [ 2621.136222] ? find_held_lock+0x2c/0x110 [ 2621.136690] ? ksys_write+0x12d/0x260 [ 2621.137104] ? __fget_files+0x2f8/0x520 [ 2621.137578] ? __fget_light+0xea/0x290 [ 2621.138060] do_writev+0x139/0x300 [ 2621.138574] ? vfs_writev+0x620/0x620 [ 2621.139075] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2621.139808] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2621.140511] do_syscall_64+0x33/0x40 [ 2621.141015] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2621.141653] RIP: 0033:0x7f952207fb19 [ 2621.142117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2621.144460] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2621.145350] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2621.146161] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2621.146990] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2621.147812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2621.148695] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:16:01 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 23) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:16:01 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x0, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:01 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x600, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:16:01 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x6, &(0x7f00000013c0)=[{&(0x7f0000000080)="47259b0a66f4d62b13f5ce6392b94e5af758ea2746cdf0233b5b4e7c87629faf58636d4c2b24a71b9dfeaa3597be4908a1bf54e4be002c305c60d0a241d54188ccbcf10547ab35f5e0711877eabb4a49ef2f2a189a0a86edeb5461b93bebaf7154513b1fb930b771f2d7da903d5ffeb41762f68587d81e41f61f84c20db5974a5365b5d5effd9450b8355a64befbbe7e4f8c49ba010248f90c8ec17d2f58a4ccf20db50e5e367f11337d818c0b3a", 0xae, 0x5}, {&(0x7f0000000140)="7f39e603d931541127ae4dfee30e15eed5c1d97b097435e1581b46a893ecae77548f58ac9b0f2a5930b183b41ebdd490c2e8d01f78effed5d6f9f7a7b10a3a537036540c2a65b4e2f778969505c0978ddc0b6c4faf28d84e1dd6c9082ef5fb65aa1bc891a988eaf0e55ff40754afac8342c6533aa53bec5b3142b1d45be8d1473ae9d987ba7a5927e04196e34af97123540a892a62c04c167086d90614fa51ee809d9adc2731f13a7e8c10392e3245b9b95b30ae91dd", 0xb6}, {&(0x7f0000000200)="674b9891b27cef92f048d9e10ee123a9d0c5b0cbdb62e7891338c2c02ed51ec96d0ef81130fe87150ad2cd7a021731c66bc7", 0x32, 0x7}, {&(0x7f0000000240)="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", 0x1000, 0x2}, {&(0x7f0000001240)="e0b5fbcb466170d078f6bf2bf6e902d556a2001b728a3fa9551cfab75b2b4b1075de1a60fbe62edae484894b29f14b921d267d0e6203ee65b2d19f4205c00a804f0e9d", 0x43, 0x3f}, {&(0x7f00000012c0)="f5bd908ba9ea6e2f20ec316ccc7668b6af967bee6618a5ce7f66194bebd28936cee79f546cc37f3d0cbaafb02d63108ea7ab79355e527ee38bf88f30e330c9e160da2c4b83a4a8663546ba10321f614eda5abe2d87f31bbeed73eebc8ae9cc1e79c32c2ec50720620424159b6a0cc95983ebc831db4e4376513467d50738db45a4dec7148bf341aed0168676fd69f568d33c9a71427702dcd8081d228f77f7619ce91814fae90c9566251b54420eebfd54f8e1ea1eedc08931bc8a6250f67e3002", 0xc1, 0x706}], 0x1080410, &(0x7f0000001480)={[{@block={'block', 0x3d, 0x600}}, {@session={'session', 0x3d, 0x30}}, {@block={'block', 0x3d, 0x800}}, {@mode={'mode', 0x3d, 0x80e}}, {@nojoliet}, {@iocharset={'iocharset', 0x3d, 'maccenteuro'}}, {}, {@uid={'uid', 0x3d, r0}}, {@map_normal}], [{@measure}, {@smackfsdef={'smackfsdef', 0x3d, '-'}}, {@hash}]}) name_to_handle_at(r1, &(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)=ANY=[@ANYBLOB="140000005200000000000000d0b7da721008edff00080000fa1a0000"], &(0x7f0000001600), 0x1000) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2621.454796] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2621.454796] program syz-executor.1 not setting count and/or reply_len properly [ 2621.466388] FAULT_INJECTION: forcing a failure. [ 2621.466388] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2621.467933] CPU: 0 PID: 13998 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2621.468814] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2621.469869] Call Trace: [ 2621.470213] dump_stack+0x107/0x167 [ 2621.470684] should_fail.cold+0x5/0xa [ 2621.471163] copy_page_from_iter+0x40a/0x900 [ 2621.471729] blk_rq_map_user_iov+0x138b/0x1a60 [ 2621.472324] ? blk_rq_unmap_user+0x750/0x750 [ 2621.472883] ? find_held_lock+0x2c/0x110 [ 2621.473409] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2621.474079] ? lock_downgrade+0x6d0/0x6d0 [ 2621.474601] ? import_single_range+0x24d/0x2e0 [ 2621.475245] blk_rq_map_user+0x103/0x170 [ 2621.475765] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2621.476368] ? alloc_pages_current+0x18f/0x280 [ 2621.476941] ? sg_build_indirect.isra.0+0x448/0x710 [ 2621.477578] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2621.478255] ? sg_build_indirect.isra.0+0x710/0x710 [ 2621.478947] ? vprintk_func+0x93/0x140 [ 2621.479486] ? record_print_text.cold+0x16/0x16 [ 2621.480127] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2621.480818] ? trace_hardirqs_on+0x5b/0x180 [ 2621.481415] sg_write.part.0+0x69e/0xaa0 [ 2621.481984] ? sg_new_write.isra.0+0x770/0x770 [ 2621.482612] ? find_held_lock+0x2c/0x110 [ 2621.483187] ? __might_fault+0xd3/0x180 [ 2621.483879] ? lock_downgrade+0x6d0/0x6d0 [ 2621.484618] ? _cond_resched+0x10/0x30 [ 2621.485235] ? inode_security+0x107/0x140 [ 2621.485799] ? avc_policy_seqno+0x9/0x70 [ 2621.486356] ? selinux_file_permission+0x92/0x520 [ 2621.487043] sg_write+0x87/0x120 [ 2621.487513] do_iter_write+0x4f0/0x700 [ 2621.488047] ? import_iovec+0x83/0xb0 [ 2621.488581] vfs_writev+0x1ae/0x620 [ 2621.489076] ? vfs_iter_write+0xa0/0xa0 [ 2621.489620] ? __fget_files+0x2cf/0x520 [ 2621.490182] ? lock_downgrade+0x6d0/0x6d0 [ 2621.490578] loop3: detected capacity change from 0 to 4096 [ 2621.490775] ? find_held_lock+0x2c/0x110 [ 2621.490797] ? ksys_write+0x12d/0x260 [ 2621.493173] ? __fget_files+0x2f8/0x520 [ 2621.493736] ? __fget_light+0xea/0x290 [ 2621.494282] do_writev+0x139/0x300 [ 2621.494779] ? vfs_writev+0x620/0x620 [ 2621.495300] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2621.496092] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2621.496838] do_syscall_64+0x33/0x40 [ 2621.497347] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2621.498048] RIP: 0033:0x7f952207fb19 [ 2621.498571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2621.501092] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2621.502150] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2621.503146] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000007 [ 2621.504111] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2621.505104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2621.506092] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:16:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x8000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:16:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r0, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:17 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 24) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:16:17 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = msgget$private(0x0, 0x225) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) r5 = fork() msgctl$IPC_SET(r1, 0x1, &(0x7f00000000c0)={{0x0, r2, r3, r4, 0xee00, 0x40, 0xd4c}, 0x0, 0x0, 0x0, 0x7, 0x955, 0x44c4, 0x0, 0x8, 0x8df9, 0x5, r5, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:16:17 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0xee01) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x4202, 0x100) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee00}}, './file0\x00'}) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x2000000ff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854c8259a0eb948058be1d80746a93c14e7b0000000000000000", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f0000000340)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@euid_gt={'euid>', r1}}]}) 20:16:17 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x0, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:17 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa00, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:16:17 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0xf401, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) [ 2636.925799] loop1: detected capacity change from 0 to 33559552 [ 2636.937850] blktrace: Concurrent blktraces are not allowed on loop14 [ 2636.960048] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2636.960048] program syz-executor.1 not setting count and/or reply_len properly [ 2636.982026] loop2: detected capacity change from 0 to 135266304 [ 2636.995554] FAULT_INJECTION: forcing a failure. [ 2636.995554] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2636.998341] CPU: 0 PID: 14038 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2636.999897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2637.001721] Call Trace: [ 2637.002296] dump_stack+0x107/0x167 [ 2637.003068] should_fail.cold+0x5/0xa [ 2637.003872] copy_page_from_iter+0x40a/0x900 [ 2637.004835] blk_rq_map_user_iov+0x138b/0x1a60 [ 2637.005811] ? blk_rq_unmap_user+0x750/0x750 [ 2637.006823] ? find_held_lock+0x2c/0x110 [ 2637.007762] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2637.008899] ? lock_downgrade+0x6d0/0x6d0 [ 2637.009795] ? import_single_range+0x24d/0x2e0 [ 2637.010914] blk_rq_map_user+0x103/0x170 [ 2637.011898] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2637.012889] ? alloc_pages_current+0x18f/0x280 [ 2637.013870] ? sg_build_indirect.isra.0+0x448/0x710 [ 2637.014978] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2637.016100] ? sg_build_indirect.isra.0+0x710/0x710 [ 2637.017170] ? vprintk_func+0x93/0x140 [ 2637.018154] ? record_print_text.cold+0x16/0x16 [ 2637.019268] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2637.020489] ? trace_hardirqs_on+0x5b/0x180 [ 2637.021583] sg_write.part.0+0x69e/0xaa0 [ 2637.022556] ? sg_new_write.isra.0+0x770/0x770 [ 2637.023755] ? find_held_lock+0x2c/0x110 [ 2637.024842] ? __might_fault+0xd3/0x180 [ 2637.025843] ? lock_downgrade+0x6d0/0x6d0 [ 2637.026852] ? _cond_resched+0x10/0x30 [ 2637.027760] ? inode_security+0x107/0x140 [ 2637.028744] ? avc_policy_seqno+0x9/0x70 [ 2637.029744] ? selinux_file_permission+0x92/0x520 [ 2637.031016] sg_write+0x87/0x120 [ 2637.031807] do_iter_write+0x4f0/0x700 [ 2637.032727] ? import_iovec+0x83/0xb0 [ 2637.033601] vfs_writev+0x1ae/0x620 [ 2637.034465] ? vfs_iter_write+0xa0/0xa0 [ 2637.035423] ? __fget_files+0x2cf/0x520 [ 2637.036336] ? lock_downgrade+0x6d0/0x6d0 [ 2637.037302] ? find_held_lock+0x2c/0x110 [ 2637.038270] ? ksys_write+0x12d/0x260 [ 2637.039186] ? __fget_files+0x2f8/0x520 [ 2637.040134] ? __fget_light+0xea/0x290 [ 2637.041149] do_writev+0x139/0x300 [ 2637.042064] ? vfs_writev+0x620/0x620 [ 2637.043206] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2637.044586] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2637.045910] do_syscall_64+0x33/0x40 [ 2637.046873] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2637.048199] RIP: 0033:0x7f952207fb19 [ 2637.049233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2637.053652] RSP: 002b:00007f951f5b3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2637.055359] RAX: ffffffffffffffda RBX: 00007f95221930e0 RCX: 00007f952207fb19 [ 2637.056926] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000009 [ 2637.058505] RBP: 00007f951f5b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2637.060066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2637.061630] R13: 00007ffd2a29b96f R14: 00007f951f5b3300 R15: 0000000000022000 [ 2637.138488] loop2: detected capacity change from 0 to 135266304 20:16:17 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r0, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:17 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x2}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:16:17 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0xb91, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2637.277297] blktrace: Concurrent blktraces are not allowed on loop14 20:16:17 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000340)=0x1c, 0x800) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000003c0), &(0x7f0000000400)=0x8) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, r2}}, './file0\x00'}) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:17 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001a00)={&(0x7f0000000080)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x8, 0x2, 0x0, 0x1, [{0x4}]}]}, 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x29, 0x6, 0x1, 0x5, 0x43, @private0, @loopback, 0x10, 0x80, 0x8, 0x8000}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'gre0\x00', &(0x7f0000000100)={'erspan0\x00', 0x0, 0x40, 0x7, 0x401, 0x4, {{0x7, 0x4, 0x1, 0x30, 0x1c, 0x64, 0x0, 0xf9, 0x4, 0x0, @broadcast, @rand_addr=0x64010100, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x2f, 0x1, 0x65, 0x3f, 0x50, @private2, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x8, 0x8, 0x7, 0x7}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={""/10, ""/2, @loopback}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r7, 0x29, 0x32, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, r6}, 0xfffffffffffffec8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) r9 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r9, 0x29, 0x32, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, r8}, 0xfffffffffffffec8) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000380)={0x1c8, r1, 0x10a, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x5, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}]}, 0x1c8}, 0x1, 0x0, 0x0, 0x200040d0}, 0x4846) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r10, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:16:17 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 25) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2637.537006] loop1: detected capacity change from 0 to 33559552 [ 2637.651726] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2637.651726] program syz-executor.1 not setting count and/or reply_len properly [ 2637.654297] FAULT_INJECTION: forcing a failure. [ 2637.654297] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2637.655977] CPU: 0 PID: 14084 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2637.656980] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2637.658184] Call Trace: [ 2637.658577] dump_stack+0x107/0x167 [ 2637.659105] should_fail.cold+0x5/0xa [ 2637.659670] copy_page_from_iter+0x40a/0x900 [ 2637.660303] blk_rq_map_user_iov+0x138b/0x1a60 [ 2637.661057] ? blk_rq_unmap_user+0x750/0x750 [ 2637.661835] ? find_held_lock+0x2c/0x110 [ 2637.662522] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2637.663458] ? lock_downgrade+0x6d0/0x6d0 [ 2637.664196] ? import_single_range+0x24d/0x2e0 [ 2637.665012] blk_rq_map_user+0x103/0x170 [ 2637.665737] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2637.666587] ? alloc_pages_current+0x18f/0x280 [ 2637.667407] ? sg_build_indirect.isra.0+0x448/0x710 [ 2637.668326] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2637.669214] ? sg_build_indirect.isra.0+0x710/0x710 [ 2637.670053] ? vprintk_func+0x93/0x140 [ 2637.670712] ? record_print_text.cold+0x16/0x16 [ 2637.671514] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2637.672385] ? trace_hardirqs_on+0x5b/0x180 [ 2637.673074] sg_write.part.0+0x69e/0xaa0 [ 2637.673775] ? sg_new_write.isra.0+0x770/0x770 [ 2637.674587] ? find_held_lock+0x2c/0x110 [ 2637.675283] ? __might_fault+0xd3/0x180 [ 2637.675954] ? lock_downgrade+0x6d0/0x6d0 [ 2637.676610] ? _cond_resched+0x10/0x30 [ 2637.677231] ? inode_security+0x107/0x140 [ 2637.677890] ? avc_policy_seqno+0x9/0x70 [ 2637.678521] ? selinux_file_permission+0x92/0x520 [ 2637.679219] sg_write+0x87/0x120 [ 2637.679707] do_iter_write+0x4f0/0x700 [ 2637.680273] ? import_iovec+0x83/0xb0 [ 2637.680815] vfs_writev+0x1ae/0x620 [ 2637.681337] ? vfs_iter_write+0xa0/0xa0 [ 2637.681922] ? __fget_files+0x2cf/0x520 [ 2637.682489] ? lock_downgrade+0x6d0/0x6d0 [ 2637.683088] ? find_held_lock+0x2c/0x110 [ 2637.683670] ? ksys_write+0x12d/0x260 [ 2637.684216] ? __fget_files+0x2f8/0x520 [ 2637.684783] ? __fget_light+0xea/0x290 [ 2637.685340] do_writev+0x139/0x300 [ 2637.685846] ? vfs_writev+0x620/0x620 [ 2637.686397] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2637.687162] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2637.687898] do_syscall_64+0x33/0x40 [ 2637.688416] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2637.689139] RIP: 0033:0x7f952207fb19 [ 2637.689669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2637.692304] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2637.693399] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2637.694429] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2637.695448] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2637.696461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2637.697495] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:16:33 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 26) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:16:33 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x4, r0, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x9000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:16:33 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x7, 0x40, 0xfc, 0x1f, 0x0, 0xfffffffffffffff7, 0x108, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000340), 0x4}, 0x4000, 0x84fe, 0x5, 0x2, 0x20, 0x6, 0x697, 0x0, 0x6, 0x0, 0x8001}, 0xffffffffffffffff, 0xd, r1, 0x1) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) llistxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)=""/197, 0xc5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x40, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}, 0x0, 0x4, 0x1, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982fb9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xdf, 0x7f}, {&(0x7f00000005c0)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f0000001a00)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@hash}, {@smackfsdef={'smackfsdef', 0x3d, 'z%\'\x96\x0fv~*\xfe\x1b\x14\xfe{L\xb9[J\xa1\xad\x1c\xe5\xd5u\x00\xc0\x05>x\xf9\xafD\xfa\x05\x00\x00\x00\x00\x00\x00\x00\x94y\x95K\xfa.\r\xa5\xfa\x1c\x1b\x9b\xc3\x14\xf9\x81\xad\x06#\xfd\xfdZ\xdf\xf6'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@fowner_lt={'fowner<', 0xee00}}]}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001b80)={&(0x7f0000001ac0)={0xb4, 0x0, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@ETHTOOL_A_DEBUG_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0xfffffc4e}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000) 20:16:33 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0xfc00, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:16:33 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2000, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:16:33 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00') move_mount(r1, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x21) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:16:33 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2653.471546] loop1: detected capacity change from 0 to 33559552 20:16:34 executing program 3: sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x24, 0x0, 0x8, 0x401, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6000}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x48055) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2653.566176] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2653.566176] program syz-executor.1 not setting count and/or reply_len properly [ 2653.569951] FAULT_INJECTION: forcing a failure. [ 2653.569951] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2653.572528] CPU: 1 PID: 14115 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2653.574023] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2653.575832] Call Trace: [ 2653.576473] dump_stack+0x107/0x167 [ 2653.577268] should_fail.cold+0x5/0xa [ 2653.578099] copy_page_from_iter+0x40a/0x900 [ 2653.579063] blk_rq_map_user_iov+0x138b/0x1a60 [ 2653.580081] ? blk_rq_unmap_user+0x750/0x750 [ 2653.581036] ? find_held_lock+0x2c/0x110 [ 2653.581921] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2653.583069] ? lock_downgrade+0x6d0/0x6d0 [ 2653.583965] ? import_single_range+0x24d/0x2e0 [ 2653.584950] blk_rq_map_user+0x103/0x170 [ 2653.585824] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2653.586848] ? alloc_pages_current+0x18f/0x280 [ 2653.587841] ? sg_build_indirect.isra.0+0x448/0x710 [ 2653.588920] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2653.590061] ? sg_build_indirect.isra.0+0x710/0x710 [ 2653.591139] ? vprintk_func+0x93/0x140 [ 2653.591990] ? record_print_text.cold+0x16/0x16 [ 2653.593001] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2653.594091] ? trace_hardirqs_on+0x5b/0x180 [ 2653.595029] sg_write.part.0+0x69e/0xaa0 [ 2653.595922] ? sg_new_write.isra.0+0x770/0x770 [ 2653.596908] ? find_held_lock+0x2c/0x110 [ 2653.597788] ? __might_fault+0xd3/0x180 [ 2653.598639] ? lock_downgrade+0x6d0/0x6d0 [ 2653.599567] ? _cond_resched+0x10/0x30 [ 2653.600404] ? inode_security+0x107/0x140 [ 2653.601297] ? avc_policy_seqno+0x9/0x70 [ 2653.602176] ? selinux_file_permission+0x92/0x520 [ 2653.603226] sg_write+0x87/0x120 [ 2653.603960] do_iter_write+0x4f0/0x700 [ 2653.604801] ? import_iovec+0x83/0xb0 [ 2653.605627] vfs_writev+0x1ae/0x620 [ 2653.606410] ? vfs_iter_write+0xa0/0xa0 [ 2653.607277] ? __fget_files+0x2cf/0x520 [ 2653.608130] ? lock_downgrade+0x6d0/0x6d0 [ 2653.609015] ? find_held_lock+0x2c/0x110 [ 2653.609898] ? ksys_write+0x12d/0x260 [ 2653.610722] ? __fget_files+0x2f8/0x520 [ 2653.611594] ? __fget_light+0xea/0x290 [ 2653.612440] do_writev+0x139/0x300 [ 2653.613206] ? vfs_writev+0x620/0x620 [ 2653.614030] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2653.615156] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2653.616279] do_syscall_64+0x33/0x40 [ 2653.617076] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2653.618176] RIP: 0033:0x7f952207fb19 [ 2653.618981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2653.622985] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2653.624637] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2653.626172] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2653.627719] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2653.629259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2653.630801] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:16:34 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4000, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:16:34 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:34 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x70, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x70}}, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x1c, r1, 0x400, 0x70bd2d, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:34 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0xfe80, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:16:34 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x100}}, './file0\x00'}) chdir(&(0x7f0000000000)='./file0\x00') setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r2 = accept$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @multicast2}, &(0x7f0000000200)=0x10) ftruncate(r2, 0x68c7904f) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x2007, @fd=r1, 0x2, &(0x7f0000000080)=""/76, 0x4c, 0xa, 0x0, {0x0, r3}}, 0xbd) [ 2653.838523] blktrace: Concurrent blktraces are not allowed on loop14 20:16:34 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 27) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:16:34 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x0, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:34 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:34 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x2) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2654.008633] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2654.008633] program syz-executor.1 not setting count and/or reply_len properly [ 2654.010957] FAULT_INJECTION: forcing a failure. [ 2654.010957] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2654.012384] CPU: 0 PID: 14153 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2654.013202] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2654.014175] Call Trace: [ 2654.014486] dump_stack+0x107/0x167 [ 2654.014911] should_fail.cold+0x5/0xa [ 2654.015379] copy_page_from_iter+0x40a/0x900 [ 2654.015905] blk_rq_map_user_iov+0x138b/0x1a60 [ 2654.016464] ? blk_rq_unmap_user+0x750/0x750 [ 2654.016985] ? find_held_lock+0x2c/0x110 [ 2654.017467] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2654.018091] ? lock_downgrade+0x6d0/0x6d0 [ 2654.018574] ? import_single_range+0x24d/0x2e0 [ 2654.019108] blk_rq_map_user+0x103/0x170 [ 2654.019598] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2654.020155] ? alloc_pages_current+0x18f/0x280 [ 2654.020693] ? sg_build_indirect.isra.0+0x448/0x710 [ 2654.021279] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2654.021895] ? sg_build_indirect.isra.0+0x710/0x710 [ 2654.022476] ? vprintk_func+0x93/0x140 [ 2654.022935] ? record_print_text.cold+0x16/0x16 [ 2654.023487] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2654.024079] ? trace_hardirqs_on+0x5b/0x180 [ 2654.024584] sg_write.part.0+0x69e/0xaa0 [ 2654.025061] ? sg_new_write.isra.0+0x770/0x770 [ 2654.025599] ? find_held_lock+0x2c/0x110 [ 2654.026082] ? __might_fault+0xd3/0x180 [ 2654.026549] ? lock_downgrade+0x6d0/0x6d0 [ 2654.027041] ? _cond_resched+0x10/0x30 [ 2654.027503] ? inode_security+0x107/0x140 [ 2654.027987] ? avc_policy_seqno+0x9/0x70 [ 2654.028461] ? selinux_file_permission+0x92/0x520 [ 2654.029026] sg_write+0x87/0x120 [ 2654.029427] do_iter_write+0x4f0/0x700 [ 2654.029880] ? import_iovec+0x83/0xb0 [ 2654.030325] vfs_writev+0x1ae/0x620 [ 2654.030749] ? vfs_iter_write+0xa0/0xa0 [ 2654.031270] ? __fget_files+0x2cf/0x520 [ 2654.031734] ? lock_downgrade+0x6d0/0x6d0 [ 2654.032234] ? find_held_lock+0x2c/0x110 [ 2654.032705] ? ksys_write+0x12d/0x260 [ 2654.033153] ? __fget_files+0x2f8/0x520 [ 2654.033617] ? __fget_light+0xea/0x290 [ 2654.034072] do_writev+0x139/0x300 [ 2654.034486] ? vfs_writev+0x620/0x620 [ 2654.034934] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2654.035555] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2654.036157] do_syscall_64+0x33/0x40 [ 2654.036590] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2654.037190] RIP: 0033:0x7f952207fb19 [ 2654.037625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2654.039796] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2654.040705] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2654.041556] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000007 [ 2654.042411] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2654.043272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2654.044127] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:16:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xa000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:16:48 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x0, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:48 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4601, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:16:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:48 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x70, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x70}}, 0x0) sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, &(0x7f00000036c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000003680)={&(0x7f0000003600)={0x7c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x99b, 0x42}}}}, [@NL80211_ATTR_TESTDATA={0x51, 0x45, "114f8b3351da3868cd05c4d2d6bc8db0658227ec2d4982a550da2c6902da389051d6906ecff23ccece504e236e4d4b03313bcf24cca08be8868d515594fbaf784811bf54e82f7c652eef427df9"}]}, 0x7c}, 0x1, 0x0, 0x0, 0x44}, 0x4004000) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000001d40)={@dev, @loopback, 0x0}, &(0x7f0000002e00)=0xc) sendmmsg$inet(r4, &(0x7f0000003500)=[{{&(0x7f0000000340)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000440)=[{&(0x7f00000003c0)="31733bc05673c43ac03446dd645979d3cea46590d3280a8f53f4e022e1ac56e033cfa516b950ea438c21e6b8dd8171012d90b697bb5544308dd787176c2e9bf3164136dff24c0434980ad037759fd64cc29d041cf57f7e593931f3aeca2f2f95c6a85e95d56a3e4d0b9eca7888c389d4ae5f6fcb20f623d6deab1f7112bf4662", 0x80}], 0x1, &(0x7f0000000480)=[@ip_tos_int={{0x14}}], 0x18}}, {{&(0x7f0000000540)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001cc0)=[{&(0x7f0000000580)="c5d92effddebdc7139b61ebcc2", 0xd}, {&(0x7f0000000800)="917a9cad6c3a55ba465491eb55c1821ba5268dd6e7eaee0be10cf2b4004c751a774d6b75d9d75403575c34d47130fc1a6e2be4487b846d2ad760baaac482b3ed799751f13011d10a13e35d7d4c1cfc06d5", 0x51}, {&(0x7f0000001900)="ab8421fcf8029c1e3dd48298c38688fc9162c3c7347b5869b8adb4c3b99e8739fe05ec82c6aad5d852af3501e870444901156435a3034d01f9da495c2abd4548c9a55cff686034b627ac9d31316875860c896ede876ab053920b99b65646eb1e869e86ce8e0e7fc6059e8181ecb68b27bc77a4a63286b153e9f5e7c7af555cb8bfd7bcd7b2f4f928f6629904af79b65053c81fe332c442d3fac01f583e023de2800030341d8888d4ae9bb7ecebb3681a7aadf21d9f49153cdd288cf5dbf37d33ad91203da4b01e2f07d15cd3979c", 0xce}, {&(0x7f0000001e00)="9e7ceb784bf4d6c90094db4def86bd5b38144a0064c3d7ad444752b75ec72293f8cd2a645728ff33df303b7958bad221264421aff397219fb27924b7810c8a52ab47edd106b77f9f0694dc4063967a7f6cfb2c99dce3446a0c35a651c900b0ed3c6533cfdcd452879fd24eecbda06493606363eb1d2e81cdcf96eeea4855da83e9d00c869bdbe9ee13a30fe59b96fef42109a052c22a06c756465aea9d24507800715573f39e52ee102dd475ccd96dd41257d875d89c6ba3d33974e8950e3a3a31d9ea67688bb47d3b9227db3690237fefbb362469a3341ffff4b8630f39b382574cf3d222a47e532df4f01ddf623249aa42b9c6fedfeaa71c769793a56b05f63765ce9c137b3f252aa83b7eb70d12b60800111e05d7ef3edf1b414e8ed6bb04ecca5c6a2ba5c48c77510c2ce65da50e6f6907e18313eb707631c1b61606260c77e18a7540deede322ce1f4a4558f47440b728fac4bab7cc15200b29abd96f52d36f5389ceb154746727a3d135117c345a673c948a8698d53a8d4ce53eaed176656b7647489b7a9dc9d56b8a8016005ea5e5c80e23b919be71ac66956e982761b8e83e1baa2ce3b37c1afff872d62355658338ff49cbf10124111645ba16da823948fadbc3da9545ed3064312eddd7e09630424a9c1fb3611b6cc48f50bd9daceecd42a0d4bc3540b8b54bfe4e2ec0510826da0151e8aa1cd4aee1a7a9071fa9ee50753f7751c8e08ee325edf05e2bddb30e17c2953c72a1bf2f58b4350861dbd5eb33d660d8d1af5e385a438c7157bb3521e8e4f2ff545f43643dc09400d852008d0950f7bff114fc6b0cb53349b3b72db4853a936fe5bf40f566bb4a3c1a92f12b2f74ee9b84b760f16dfaaf6935a8671e70b74ca55f99bcbade029957a4740285cc93bd8ab978057607a49f10d0f8ba861a69de693b2d16ee8dec970a69aca592b7cfc6a2591f524dedca2be818945de5821affef97efe9226bc8f823c45fbb985214d39b5390d472fdd3e61ea93be69d33180a44a765dbdb1aac860861c0b0a3b7de25850dc7042b5260264fb2beb68e2005cbdb848c8612a0e8239fa6c1c35e99cea0a4d7ba4aa924ae8016db3101c6c54edbe2f59b1902ccbbfb2b985cb69d767f4e4abaad34e60a8e45588750970b109c7a95f7d1a4169b697d3ff3af0728f40a897153815434821c23c6498295b953082fe2660e8a94ffb2203840ea1dfb5198b6d39510687b741dc95cf32293034a344bddd964d3a240fcd16b6d2173c3889c5d1032d6eac9e6c4603e6514dd0a674fa7a8fa30aac72c1daac51d48d944fb5b48cc4d5dfc3539d3448c7fa963ce8c7c8a7d6f6f405d7798a39b3beb04b06e50cc5464ff178df4a0d974571ec6f82ddd9a6c708d1e20583c82b8940ea65ce47bb384e1713b46669ac3866606a679b1da983f437f746bc0c0f84eb06ba7f4aaca32ae8f00a7860a12bf46f40b44fb5de39991a5fbcc60efdec45b99157afba289287128e3cb7d33fa99d30b2f8df9e7129f01abd61af9765b4ce204761edaabe559afd6b086ef15ea983e91fcd5e22945f3338d273036db2b23427037d20bf9cb59f8c2f5f1af82ef114b15f3f935bee6d52875553fc030a9252a37c90dc6d9ab0d1d8d389c2de5cc6e2826a2425ba87b9bb170763b288a7bc5399166a2e65a5e0f99bcf79cb77c5f665e7d4afc5e7e8fca2e8b8d5362f183105e1e70d592427b170e35d060ae582602d944a20a7468bbf52bee20b9f5908df87ee85aa4928bea6754e5760425c5f74c52b04e95c0c6c3e5efb2f85fc933fea52c320c995e48777df15f95cd6135eca911e20d502a0faabac99e7923134e033583a5b0a4970f317eec22796eca34d6fc6d967fb2ad14accdd0d603bfe62ab903fa94bcd244d70d97acc9b0016d599caafea1ba053edf77c0dd3c5dc327d838893eff545a6fb0caeacaeed8d054e45c42ff7471fe985ad4ad4f94dcf7be6a7d1aaaa8cc906fb50d318fd5aa3b4a4f7502ad7acfd41e63534105ee314e3897630b62d82ecb366532edee33c5aabd44ad410ebb261ff5ee8a4176a7468c9b6a9c98a6499b464ef73462603ef308c87fbadf0381b2731fc78e58f1730972a0aa29916ffbb7669210c5cc2802d9ea9fbaf1cb5e93c6640be2339362848f3d30426fbd6a9a8a92901b0e8f324cae2e989c788a24d695da26dad2f5ec609ff344fad988e5fce6bdbe7adbff1ec8b50617b428788da26ca8d274aa9eef7a409ac606b68e917c3cdb9729c831af41114a2581ed406a013a35841e6f4cda2c3d1bc22e52eb5b6a49afaf09122550dee4e3ce39987f7e4a444fb8524a5c8fc6bb39c033a8b7db15ee6ca0218346d5325f592bb9045126d935c67781540fdd65f0a3b2a69b58062399a98003bd0318b5752164222fa19d5fae10f57c58667b1663fb86e868f0b1468e3219c04883036b99f60e8a7be8ae9942d10535cc5cd7b57eb43971a5e417cd8f794dcbd4abe6290f36586d1952b8123d130f0eac773c9e3d01741b7f2a5cc435adbf6af1cd50592046b990a9ce3bb597e9111fe63c1bc0a011201badd7a995ab281da1f2e12bbcc14d4b6bfcb3cc87065b26797007ed3f82ab96a5aca761e846ff34bcdcfe83657f655fbd53093fdf12fda25a0fb7e3a8a0da7d24261a73769b997efc9b61ac70f99e51afd763ce68ba73be5ac3dbc3c901f732d16f1b242eeedb5fead1377e0934856d962f164d5ac79c814dee531cd9f14683e5bcfee5e2ac7a9d851901d88d675dfc4f519af9c128d789f8c39b3f75789cfa9cac6ea1f1b91dc1bf66235553e7b8dfe22a68642344268ced6e9817df6358618ca525917a2ab28613665c3281f1c903af73525fe6a2addca00cd99a187847cebb797b2ae7dd747842fc9baa0248fb46225c8ee583e42a9c4aab677496e6bbb056285017d7fbe5e04582477b0fc96891dafbb1585c09cbf0abfae354342f61f875fd6cae84ee996ceb459809c629226588710a3a274c51e167503e8312a3afa8cf7bbda3c971a219b0ea420392d63977f5af4bf00851c17351f188c24b633d982b37bd5fb52679ed9a5ae2a478cf19ab5b49fdbe91d6c0500a88c0b1bfa4fb8c2324c0938a365fc5497e9e942e2317c771252600201830980dd2f42d15a9298b4e3aac044271d8e09b1d1379245946d6921b2bb9e54172700b1bf6e9108da7eb8799067d5390e5480f3444cb77398e1165ddcbffc641a134db2243c22324a4709e077a75f99023b09aa3248f0f39dc6afe5c16dbd9f7d3f1d1a877b10efdcfe3ae120ed574b6fdebe5cdaed30e8df4462c3fd6e95aa8011aada25afcfac302da36bf137ee8d55697c557e00d646b87ce11c7b57eeb97fea81962823647c89e3de5b2cece70d50bbcd334a098a4595c3f519db6723bb283c200ed0602a4a4f75524cc59e09c316f6265321c448399afa994de044566104cf35ea14821262366be5702aae504900a7d2c080b26302403b9df2c63a0a588d9bad40062463509a13ced8b989d9bb9972c346e7e6427b4fbd863b10915beb62f33a477e0dd7b1b8c1845ae4059a8c1a15c41429aff1e96fa3d1b9ee76045ef11323763501dbdbdbd74ce64c2aeab41de264ddcfbd1298021f3c139013c9ed0191b7435e39a08ac3479176dfd0795f6b99258f5fdcb98c7ddb10e167731199b43eb597de48e3666ee81eb52d051140c2f148109d5dbeec3c6b14d881ffa2095b2f6a39ff1f885ab3942488df29c5c601040a4b40d857f420ec099749852b39b7156673ba9367e600ab368a1b48d6e2193c844476815cb0c35d251d525b5e968211b5c49875073e59224a6008d8833007d3838f7ab0f4b4889ef30623dd231567272cd6b8c1ec9e0cdd2349dd02d1247a189a41704f51d6f8097ec397ca1ee5d2ce81dbd31cac8654c270f2011be3c37a4c98d861b59ad94c6e762426cd1306912abe502f459a419221e62dc317297a4b45ab1d5f87f41d5842e99f464e2c7dbdaecf8410a117a520c6f2e6e3d44ad76b1b43888af08f44e82c6944226e3490767c4ae4edf0e5840b3654b1594cbc1ffe3531f9d485bc7c577545eb7519792b5400a37c4cbf800923365b9c8fe188a43464c9ac82e01326116389f5e69cb942f51e2e91c651c834e26bcd3a8490c08b0865623160eb7c473a636f23f8b0f366f3b406b9e4462d8cee66b9164540d8b40ffe7723d56ebbbfbb4a4ec5b7f782032a8969bbb2ef2d7e9856fa1fe31ada73d1245a76d03307826201e70eb0f0cdf950aa277aa19a89914c4a564451a19d35dbf921b3a01b463770ee105146678cf892a026ad5a7427d14531eea0c2770623be63fb4f028257da7d2014bc67cd6fa705e895b141b2d88e21171ba3291009c5e080e5b77a632c5762b70213784fcfadda9562b19652a238067c874d59ccea4ea64a807484efda4527dce033375d9bad3321bb670bb0618843945b82165fcd871dc8ee73295f5792286f59ebb059ce9a35eba827e6336ad66da2da59d66fec24dc2a9d7e6e7fee3600035d34bda63a74c9ce0d408a4451eb3f49288c3909f1b6583bd4a417a33269f8034f3b15e74a33d36a3866336db97f53dfc32def8dcd931724d4aa840ae35e5aa1fe43a50e44819937a8151a4819082d989c024797d2d735e4fe9dfc0e5b5cee6157b89fa0481f5791cdba38b7599f69bb4e2929d9a784cc163fa16e4f28b0603848127df59c6d4aeb4aa400ff1054b7a079e1bf38e1e9cfa03a15f09389d097afdab37d4805dc84626cb8c416e97129d3b9133f5c0349ea637dc477312bfea68c90be0a7cd37b69549abfba1f217c671e0ab34a50d7e6f2ee3f0aeeffcdb9db3d33a1d042cd8b25dd5cff24410488591b463dbffb2139b58974231865785302d6f70cc80af05291270f8b6f53f3e96c64c4a68169c638b9fbb7e1d646c0b95075349d95a23555c70bb8116397bc55a0439fdf2cae9b8e98ad16cb464683dae2edd5a9baa8d0c2b135b69b0c4c3fd5ca27dc82e465995ce6fb790900969f437b8ccc84c33afed69b4c9ed2e4299b39b3a787acf97854481dceb59318f47714d9a8710620bbdcc21e25c1f2808bbdc1176a482b2d48796d91a5622ad7187172669eaf2ae28d324283e72aebb08a34d61afde43c550a8de1d5b6260cd40a5e5a6f4a34ff7abc44a5fa1110d8489f026120952d6335109091ef54a3ad3201f9aeac8bca6270b9f7eddf989f70cdc78dfed0f6d06cc1da08ae1c1b94c7524098673f5b3ece8d7f990bdf184b1a85baad8ecf8a2450c9a259a6ad219b846b49992bc65c97fc041d06f95a6562c39237df144dbbf74aed6329531ea57ed170cb39d4b4fa2f4028eb48d16a30c50cfeb12cf18dcd47ac0996ddaced5eb4251aea824fd9176c9a391eea531af44c035d5271ce9c9408f58ec4f147126ff0b6861693834cf2e2ad9433ac37b25624f8f0d273dae49cc66083fe5ef3f6e2c0560d63ea186305aded3961ca02a539ca7c72f0209f1af2a0f6b2c5546827728526fa0bd7233772a683ec9d29d57393605ec43da9b805ad736ec9123110cc29b27f27714f72a968a79b58c18deb7d29f8b49c5266a14f167d89ab6293c79e19ae901457a8259ebbaa5da4c7b69d1078d458de4bc1c24ae86e6e2a80c9836f4cdcb24bb1a9440b50482ecdad2db30b37d155a39cc60049c10fe24cec0409e7897051c36fe1aa51816dd78dbafe5f207b94a312754392f00b37ef4b5a14fe5aee63dd6277142fc874ca0fb709f96ed3fcda23791ed3fea4adcdedf3ff57945", 0x1000}, {&(0x7f00000005c0)}, {&(0x7f0000001a00)="bd233c121aea7c41ab842ca81544e426c33c6ecd20f4c2fc234d4d9217b3f84ad56b8ca46710954b10039ad8ddca23d49a4304f988252c2beb10e2e42cb0302439c2bd7776431a19bffb4c655694085459acacf1faffc40e547a4293689433b42735086a3942aa5e44f369e2c330ae53256dce193c4e3d23f1f90df54dfcd1dc4dd4fee415006dda527aeb8f55f2a492dc32372e7ff5822b98c434685b8533c96211c7fe7e91a7f36b394801525414e22d9d928c37d4f5e3f0d17aed513579d3b629c0433809c44c9d392770a4e29415ec29131ee2fa196690a6ab532f6e3baec7", 0xe1}, {&(0x7f0000001b00)="9b56ee455e40695f8f9981005d3b9ecc593b200a096907f81456d124a9a4b3c99d20b0af8a209c186784a2932698e3b0c1f11d117395dc19bf21f8827213df62cfaea84f13c75a9d6203c6c762b13f0764007d701ae5eedd2a8c7248d22cbacd9c1a13d25c9b54a21901d74c0d03034dd062922f8ae5fa57ceb7fe408829dad6ca3e39878979dd922275bb706371026e737927999db3206e429a6e4fda56c7adecd36ade4d4595b4bc7cffdacefcfe0e504256b45dcaa33dfff6af16c6535ca06c49c72082d2fb39549e5fce4abde8feeb0fb5b8ff2dd470f3c9690b0cc4270c42c4ecd49ac3710537165ce3", 0xec}, {&(0x7f0000001c00)="99ddee3300c67ed31171e95c176fd7e3b8f92f7683389733f1e1132b58d376b5c9cf4462867c530e35834ab31540134021b9330dfc3abce61c524e23322846b5b2ee6be0f04d03b7a2359e83bc383eafc0299da002047a4f264be67631b173c75e578550f735c1ad9774897408c4eafedf03d49f145e59b39015bb79b2321c0998addc0f8c1849c9b5c6bce395704a16", 0x90}], 0x8, &(0x7f0000002e40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x1d692302}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xd4}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @multicast1}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xa41}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10001}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @generic={0x82, 0x4, '0W'}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8acf}}], 0xe0}}, {{&(0x7f0000002f40)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000003140)=[{&(0x7f0000002f80)="bf0208f3a9b8e78da69a4bc9857bb10e2903167b3849a60563ad7c5a0e476cff8e7614dd8e699a74335b7637cdc0c4556189982ce1b3d39f77f6af17feceb5aa3852cc21da5ce989edbbb3b87d2975735b84cab36fe64b5c91bb430330a8b0ce7f9587953d60946063b445caaf389f203c30f58ad24463b7571b24dfa97e6552c8e7e7df2356e6e6a6b85d8c9aacb462313a694f092e54fbd80f545e17d390d04c31943451d55d59c5a973dd4d242f736df80ce222431bf7", 0xb8}, {&(0x7f0000003040)="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", 0xfd}], 0x2}}, {{&(0x7f0000003180)={0x2, 0x4e20, @rand_addr=0x64010100}, 0x10, &(0x7f0000003480)=[{&(0x7f00000031c0)="1c2a71035ee05d3fe559c97a7304a5bbf999ffa6d2aaf852be11927b224e9d88b99db08f93c5ca2898129dcf378db7a16c9da3991bd4a70e7041a560a0cc4239ca0fb8a21884d535905ce4351c4c654e24c262dd3a804d1a2b46484406afd07f18c2146abbefb4d2fde7a2049136a247a674dc815ee77b7374d9f5b10ada9f0b2ed5eb47811c14843e3a6124c1515a7bffbdea415868f010941cb2a6742f300a2689fbc11a2bc94c2eb1d21b400ea7c86a18c4704f48032949b9a5dfe58c0b58a85e3cb4c6be9e85fc7a1fa228efce109d", 0xd1}, {&(0x7f00000032c0)="e576f1f4f95488ca17774f11c0db61822e0cd4a46ed06878e0ff1360a24ca3c9e5257a25006ff615aaa3b22f0ff8dd813f590ac499161e2e", 0x38}, {&(0x7f0000003300)="8a9904115127b4c743e59eb6561420b808ec33024faf00fff42acd65f093f5df6ed5eb31e5e1692224ee42857b1c5bbd2b0e64a986bb5eef9e88da3e1f", 0x3d}, {&(0x7f0000003340)="58f054bb67e34ed18122fb42d0910e8f3892e8ff9c8b7621265f032ae22a0159d17dc9935c3eed8dfce292c05ae627aefacf80fed53857ee3c0f0f4125bcb7a6755e61e5dc3e675c9d4f7600bf59e6b4b7f03abece03fe1e", 0x58}, {&(0x7f00000033c0)="0db2cdc34e2018463c2803a7d210bedb276ff821514d1c98efa7989a9a9c898dc9d416e02140a2d351e0ed6c997f67385da354ea2f89f2eb8221416763735bd5433c481375d6f605bc43a575d6d8fa2f022eb4a9dbb410350d8332993bd954a887c35cadeb87d497dde84c24dd8e35243f3f4719f5be2fb00f2b5991", 0x7c}, {&(0x7f0000003440)="f7370430b1850f9fbbf228d8f6dd14199f7dbc532619968a", 0x18}], 0x6}}], 0x4, 0x4000810) 20:16:48 executing program 3: stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r2 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x3, 0x2000) r3 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) io_uring_enter(r3, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0xff}}, './file0\x00'}) chown(&(0x7f0000000000)='./file0\x00', r0, r1) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r4, r5) 20:16:48 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 28) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:16:48 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0xfec0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) [ 2668.021771] loop1: detected capacity change from 0 to 33559552 [ 2668.030007] blktrace: Concurrent blktraces are not allowed on loop14 20:16:48 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, '\x00', [{0xa48, 0xaf, 0x5, 0x1f, 0x7, 0x1b}, {0x200, 0x7, 0x7, 0x8001, 0x6, 0x9d71}], ['\x00']}) [ 2668.098804] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2668.098804] program syz-executor.1 not setting count and/or reply_len properly [ 2668.101061] FAULT_INJECTION: forcing a failure. [ 2668.101061] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2668.102567] CPU: 0 PID: 14192 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2668.103457] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2668.104504] Call Trace: [ 2668.104965] dump_stack+0x107/0x167 [ 2668.105427] should_fail.cold+0x5/0xa [ 2668.105914] copy_page_from_iter+0x40a/0x900 [ 2668.106482] blk_rq_map_user_iov+0x138b/0x1a60 [ 2668.107075] ? blk_rq_unmap_user+0x750/0x750 [ 2668.107655] ? find_held_lock+0x2c/0x110 [ 2668.108172] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2668.108852] ? lock_downgrade+0x6d0/0x6d0 [ 2668.109378] ? import_single_range+0x24d/0x2e0 [ 2668.109958] blk_rq_map_user+0x103/0x170 [ 2668.110471] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2668.111076] ? alloc_pages_current+0x18f/0x280 [ 2668.111667] ? sg_build_indirect.isra.0+0x448/0x710 [ 2668.112308] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2668.112981] ? sg_build_indirect.isra.0+0x710/0x710 [ 2668.113620] ? vprintk_func+0x93/0x140 [ 2668.114086] ? record_print_text.cold+0x16/0x16 [ 2668.114677] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2668.115309] ? trace_hardirqs_on+0x5b/0x180 [ 2668.115870] sg_write.part.0+0x69e/0xaa0 [ 2668.116386] ? sg_new_write.isra.0+0x770/0x770 [ 2668.117026] ? find_held_lock+0x2c/0x110 [ 2668.117543] ? __might_fault+0xd3/0x180 [ 2668.118041] ? lock_downgrade+0x6d0/0x6d0 [ 2668.118571] ? _cond_resched+0x10/0x30 [ 2668.119057] ? inode_security+0x107/0x140 [ 2668.119587] ? avc_policy_seqno+0x9/0x70 [ 2668.120094] ? selinux_file_permission+0x92/0x520 [ 2668.120705] sg_write+0x87/0x120 [ 2668.121131] do_iter_write+0x4f0/0x700 [ 2668.121616] ? import_iovec+0x83/0xb0 [ 2668.122095] vfs_writev+0x1ae/0x620 [ 2668.122552] ? vfs_iter_write+0xa0/0xa0 [ 2668.123052] ? __fget_files+0x2cf/0x520 [ 2668.123552] ? lock_downgrade+0x6d0/0x6d0 [ 2668.124073] ? find_held_lock+0x2c/0x110 [ 2668.124587] ? ksys_write+0x12d/0x260 [ 2668.125063] ? __fget_files+0x2f8/0x520 [ 2668.125536] ? __fget_light+0xea/0x290 [ 2668.126030] do_writev+0x139/0x300 [ 2668.126479] ? vfs_writev+0x620/0x620 [ 2668.126959] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2668.127630] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2668.128281] do_syscall_64+0x33/0x40 [ 2668.128751] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2668.129358] RIP: 0033:0x7f952207fb19 [ 2668.129829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2668.132173] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2668.133130] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2668.133963] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2668.134851] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2668.135741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2668.136575] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:16:48 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x0, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:16:48 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 20:16:48 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53e74a7ca4afae992b"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000340)={0x2, &(0x7f00000001c0)=[{0x8001, 0x1, 0x40, 0x8}, {0x9, 0x0, 0x5, 0x7}]}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x1000000, &(0x7f0000000540)) 20:16:48 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4800, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:16:48 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) 20:16:48 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 29) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2668.372956] blktrace: Concurrent blktraces are not allowed on loop14 [ 2668.415842] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2668.415842] program syz-executor.1 not setting count and/or reply_len properly [ 2668.417948] FAULT_INJECTION: forcing a failure. [ 2668.417948] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2668.419335] CPU: 0 PID: 14220 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2668.420177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2668.421149] Call Trace: [ 2668.421465] dump_stack+0x107/0x167 [ 2668.421890] should_fail.cold+0x5/0xa [ 2668.422333] copy_page_from_iter+0x40a/0x900 [ 2668.422846] blk_rq_map_user_iov+0x138b/0x1a60 [ 2668.423392] ? blk_rq_unmap_user+0x750/0x750 [ 2668.423931] ? find_held_lock+0x2c/0x110 [ 2668.424417] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2668.425056] ? lock_downgrade+0x6d0/0x6d0 [ 2668.425530] ? import_single_range+0x24d/0x2e0 [ 2668.426124] blk_rq_map_user+0x103/0x170 [ 2668.426596] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2668.427157] ? alloc_pages_current+0x18f/0x280 [ 2668.427744] ? sg_build_indirect.isra.0+0x448/0x710 [ 2668.428308] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2668.428892] ? sg_build_indirect.isra.0+0x710/0x710 [ 2668.429451] ? vprintk_func+0x93/0x140 [ 2668.429888] ? record_print_text.cold+0x16/0x16 [ 2668.430422] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2668.430994] ? trace_hardirqs_on+0x5b/0x180 [ 2668.431495] sg_write.part.0+0x69e/0xaa0 [ 2668.431956] ? sg_new_write.isra.0+0x770/0x770 [ 2668.432478] ? find_held_lock+0x2c/0x110 [ 2668.432945] ? __might_fault+0xd3/0x180 [ 2668.433401] ? lock_downgrade+0x6d0/0x6d0 [ 2668.433885] ? _cond_resched+0x10/0x30 [ 2668.434328] ? inode_security+0x107/0x140 [ 2668.434806] ? avc_policy_seqno+0x9/0x70 [ 2668.435269] ? selinux_file_permission+0x92/0x520 [ 2668.435832] sg_write+0x87/0x120 [ 2668.436221] do_iter_write+0x4f0/0x700 [ 2668.436674] ? import_iovec+0x83/0xb0 [ 2668.437111] vfs_writev+0x1ae/0x620 [ 2668.437524] ? vfs_iter_write+0xa0/0xa0 [ 2668.437982] ? __fget_files+0x2cf/0x520 [ 2668.438434] ? lock_downgrade+0x6d0/0x6d0 [ 2668.438903] ? find_held_lock+0x2c/0x110 [ 2668.439366] ? ksys_write+0x12d/0x260 [ 2668.439812] ? __fget_files+0x2f8/0x520 [ 2668.440271] ? __fget_light+0xea/0x290 [ 2668.440715] do_writev+0x139/0x300 [ 2668.441121] ? vfs_writev+0x620/0x620 [ 2668.441555] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2668.442152] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2668.442739] do_syscall_64+0x33/0x40 [ 2668.443168] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2668.443753] RIP: 0033:0x7f952207fb19 [ 2668.444179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2668.446250] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2668.447104] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2668.447927] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000007 [ 2668.448737] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2668.449542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2668.450351] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:17:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xb000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:17:02 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0xff00, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:17:02 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c00, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:17:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:02 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)=@sha1={0x1, "36b5d9713171133bf1f9500afcddea7c697529c2"}, 0x15, 0x1) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:17:02 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, 0xffffffffffffffff, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:02 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='nilfs2\x00', 0x800, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 30) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2682.190878] loop1: detected capacity change from 0 to 33559552 [ 2682.194603] blktrace: Concurrent blktraces are not allowed on loop14 [ 2682.333934] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2682.333934] program syz-executor.1 not setting count and/or reply_len properly [ 2682.341151] FAULT_INJECTION: forcing a failure. [ 2682.341151] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2682.342489] CPU: 0 PID: 14262 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2682.343280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2682.344238] Call Trace: [ 2682.344543] dump_stack+0x107/0x167 [ 2682.344960] should_fail.cold+0x5/0xa [ 2682.345400] copy_page_from_iter+0x40a/0x900 [ 2682.345911] blk_rq_map_user_iov+0x138b/0x1a60 [ 2682.346442] ? blk_rq_unmap_user+0x750/0x750 [ 2682.346951] ? find_held_lock+0x2c/0x110 [ 2682.347421] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2682.348038] ? lock_downgrade+0x6d0/0x6d0 [ 2682.348509] ? import_single_range+0x24d/0x2e0 [ 2682.349030] blk_rq_map_user+0x103/0x170 [ 2682.349493] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2682.350031] ? alloc_pages_current+0x18f/0x280 [ 2682.350557] ? sg_build_indirect.isra.0+0x448/0x710 [ 2682.351134] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2682.351748] ? sg_build_indirect.isra.0+0x710/0x710 [ 2682.352314] ? vprintk_func+0x93/0x140 [ 2682.352760] ? record_print_text.cold+0x16/0x16 [ 2682.353293] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2682.353867] ? trace_hardirqs_on+0x5b/0x180 [ 2682.354364] sg_write.part.0+0x69e/0xaa0 [ 2682.354825] ? sg_new_write.isra.0+0x770/0x770 [ 2682.355345] ? find_held_lock+0x2c/0x110 [ 2682.355815] ? __might_fault+0xd3/0x180 [ 2682.356268] ? lock_downgrade+0x6d0/0x6d0 [ 2682.356749] ? _cond_resched+0x10/0x30 [ 2682.357189] ? inode_security+0x107/0x140 [ 2682.357666] ? avc_policy_seqno+0x9/0x70 [ 2682.358125] ? selinux_file_permission+0x92/0x520 [ 2682.358680] sg_write+0x87/0x120 [ 2682.359066] do_iter_write+0x4f0/0x700 [ 2682.359513] ? import_iovec+0x83/0xb0 [ 2682.359960] vfs_writev+0x1ae/0x620 [ 2682.360376] ? vfs_iter_write+0xa0/0xa0 [ 2682.360833] ? __fget_files+0x2cf/0x520 [ 2682.361295] ? lock_downgrade+0x6d0/0x6d0 [ 2682.361763] ? find_held_lock+0x2c/0x110 [ 2682.362227] ? ksys_write+0x12d/0x260 [ 2682.362665] ? __fget_files+0x2f8/0x520 [ 2682.363122] ? __fget_light+0xea/0x290 [ 2682.363567] do_writev+0x139/0x300 [ 2682.363980] ? vfs_writev+0x620/0x620 [ 2682.364414] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2682.365037] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2682.365625] do_syscall_64+0x33/0x40 [ 2682.366048] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2682.366633] RIP: 0033:0x7f952207fb19 [ 2682.367055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2682.369158] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2682.370029] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2682.370839] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2682.371654] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2682.372469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2682.373282] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:17:02 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x20}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:17:02 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, 0xffffffffffffffff, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:03 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000540)=0xe8) clock_gettime(0x0, &(0x7f0000005480)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000001900)=""/228, 0xe4}, {&(0x7f0000001a00)=""/236, 0xec}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/224, 0xe0}, {&(0x7f0000005840)=""/79, 0x4f}, {&(0x7f0000000800)=""/102, 0x66}, {&(0x7f0000001c00)=""/13, 0xd}, {&(0x7f0000001c40)=""/173, 0xad}], 0x8}}, {{0x0, 0x0, &(0x7f0000005280)=[{&(0x7f0000002e00)=""/223, 0xdf}, {&(0x7f0000002f00)=""/160, 0xa0}, {&(0x7f0000002fc0)=""/167, 0xa7}, {&(0x7f0000003080)=""/122, 0x7a}, {&(0x7f0000003100)=""/237, 0xed}, {&(0x7f0000003200)=""/63, 0x3f}, {&(0x7f0000003240)=""/28, 0x1c}, {&(0x7f0000003280)=""/4096, 0x1000}, {&(0x7f00000058c0)=""/4096, 0x1000}], 0x9, &(0x7f0000005340)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}}], 0x2, 0x40000002, &(0x7f00000054c0)={r3, r4+60000000}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005700)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f0000005540)=""/215, 0xd7}], 0x1, &(0x7f0000005680)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x60}}], 0x1, 0x40, &(0x7f0000005740)={0x77359400}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000005780)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) setxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000057c0)={{}, {0x1, 0x6}, [{0x2, 0x5}, {0x2, 0x2, 0xffffffffffffffff}, {0x2, 0x7, r2}], {0x4, 0x2}, [{0x8, 0x0, r5}, {0x8, 0x3, 0xee01}, {0x8, 0x7, 0xee00}, {0x8, 0x5, 0xee01}, {0x8, 0x2, 0xee01}, {0x8, 0x1, r6}, {0x8, 0x0, r7}, {0x8, 0x5, 0xffffffffffffffff}], {}, {0x20, 0x1}}, 0x7c, 0x2) 20:17:17 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="619c2ce9640ae50d0be7603be1d80f9e3579d4a5543c5ca0abc00fb60bbc54fb1f1cb28a5e2d200b3c6259f02af91dcaccfa70cfd804caa3804e45abb54ce58d5819993a944957a4df5814d99af76575bdfbf0cd01ebc3cff052fb4a29098beb"]) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000280)={0x2, 0x0, 0xfff, 0x81, 0xffffffffffffffff}) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f0000000340)=ANY=[@ANYBLOB="6772706a71536d7461042e0200000065302c7569643e77", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:17:17 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 31) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:17:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xd000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:17:17 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6601, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:17:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file1\x00', r3, &(0x7f0000000600)='./file0/file1\x00') getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) openat(r0, &(0x7f0000000500)='./file0\x00', 0x20000, 0x1243fe76ebd86535) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000000)={0x1d, 0x40, 0x9}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) pwritev2(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000180)="cf02165fdf7043a18cf1c154065ff13d9982a423c995abfc8a65d7e92e4f8fb8921684fe7acccb661ffb322c428ba5a38a1ac594203d8952b594ff3023d20c968388014d71e9e1ba1bfe816bd08962b2536130986420c8a111cd7760ab71ae91e9aaae0f4ea63da49b48d3e48f97621ad5c9e7964881476442935256fe342c0c6d081cbcb30183", 0x87}, {&(0x7f0000000240)="d812d9d5dd924eb43c8de9cee18c71d847d70653ed9b00931d75f99294276a78ef0a4a5ecdb35520b9e151f7c1cea9d1bc4710449b4877750ba7f9873e8a7c082e2c2a8556ccd0ddde7af9c2668b7540ad948367fd9f9b2ef7d2f26b4b69e2e8a0f1d40c4bc99902101449b74324cecb0d225ce5303f62488ef40fdf9c68f9f2956553d382c7926eec2b116329567e7f0c60034b", 0x94}, {&(0x7f0000000300)="2f599d8955a0abd71373ad693ad942d2068f56ace1f78bfe0092f9c79b76544e44917afdbfb29149e9f22ccb813a8eb23e110977b504428a223d4c6f59b73f636e281aba2e88d09c5cef999d8af53192d2cf8d24f284fafa41d012f435bb085cb6", 0x61}, {&(0x7f0000000380)="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", 0xfd}], 0x4, 0x1, 0x4, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r2, {0x2}}, './file0/file0\x00'}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x4000010, r5, 0x8000000) setresuid(0xffffffffffffffff, r4, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwrite64(r0, &(0x7f0000000540)="5a2f3aaae1e88b4dfa343a3107ba641f1dbfad656036558def2107954a3b27c58912bc1684c39177b36d7d7870d6b371b01b3381950aae56a799e507cbc48e34ea3c10e1336280b606c2e1a0ae399635ab453174ecda74424e2054d40dc5c95567ab832884cd04ced783a6c39b787df3b055a311d51040ab7a8efb2cf87f1ca51b4751110125a920af57c26f158ed76e7d2b507a58a4892635ad15ee278bb49c47990518a77a66206b05910b74721a8a1e8d1f58b72624aad8aac4", 0xbb, 0x5) 20:17:17 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x20480, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:17:17 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, 0xffffffffffffffff, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2696.846466] loop1: detected capacity change from 0 to 33559552 20:17:17 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={'L-'}, 0x16, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x70) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x14a) [ 2697.017865] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2697.017865] program syz-executor.1 not setting count and/or reply_len properly 20:17:17 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6800, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2697.048564] FAULT_INJECTION: forcing a failure. [ 2697.048564] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2697.051127] CPU: 0 PID: 14305 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2697.052627] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2697.054421] Call Trace: [ 2697.054995] dump_stack+0x107/0x167 [ 2697.055794] should_fail.cold+0x5/0xa [ 2697.056626] copy_page_from_iter+0x40a/0x900 [ 2697.057582] blk_rq_map_user_iov+0x138b/0x1a60 [ 2697.058584] ? blk_rq_unmap_user+0x750/0x750 [ 2697.059543] ? find_held_lock+0x2c/0x110 [ 2697.060444] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2697.061602] ? lock_downgrade+0x6d0/0x6d0 [ 2697.062492] ? import_single_range+0x24d/0x2e0 [ 2697.063473] blk_rq_map_user+0x103/0x170 [ 2697.064359] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2697.065379] ? alloc_pages_current+0x18f/0x280 [ 2697.066367] ? sg_build_indirect.isra.0+0x448/0x710 [ 2697.067448] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2697.068570] ? sg_build_indirect.isra.0+0x710/0x710 [ 2697.069648] ? vprintk_func+0x93/0x140 [ 2697.070492] ? record_print_text.cold+0x16/0x16 [ 2697.071505] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2697.072619] ? trace_hardirqs_on+0x5b/0x180 [ 2697.073572] sg_write.part.0+0x69e/0xaa0 [ 2697.074463] ? sg_new_write.isra.0+0x770/0x770 [ 2697.075462] ? find_held_lock+0x2c/0x110 [ 2697.076363] ? __might_fault+0xd3/0x180 [ 2697.077229] ? lock_downgrade+0x6d0/0x6d0 [ 2697.078158] ? _cond_resched+0x10/0x30 [ 2697.079004] ? inode_security+0x107/0x140 [ 2697.079909] ? avc_policy_seqno+0x9/0x70 [ 2697.080768] ? selinux_file_permission+0x92/0x520 [ 2697.081840] sg_write+0x87/0x120 [ 2697.082651] do_iter_write+0x4f0/0x700 [ 2697.083524] ? import_iovec+0x83/0xb0 [ 2697.084379] vfs_writev+0x1ae/0x620 [ 2697.085186] ? vfs_iter_write+0xa0/0xa0 [ 2697.086063] ? __fget_files+0x2cf/0x520 [ 2697.086935] ? lock_downgrade+0x6d0/0x6d0 [ 2697.087855] ? find_held_lock+0x2c/0x110 [ 2697.088767] ? ksys_write+0x12d/0x260 [ 2697.089625] ? __fget_files+0x2f8/0x520 [ 2697.090526] ? __fget_light+0xea/0x290 [ 2697.091391] do_writev+0x139/0x300 [ 2697.092153] ? vfs_writev+0x620/0x620 [ 2697.093018] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2697.094193] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2697.095355] do_syscall_64+0x33/0x40 [ 2697.096220] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2697.097378] RIP: 0033:0x7f952207fb19 [ 2697.098226] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2697.102442] RSP: 002b:00007f951f5f5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2697.104106] RAX: ffffffffffffffda RBX: 00007f9522192f60 RCX: 00007f952207fb19 [ 2697.105749] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 000000000000000a [ 2697.107503] RBP: 00007f951f5f51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2697.109291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2697.111054] R13: 00007ffd2a29b96f R14: 00007f951f5f5300 R15: 0000000000022000 [ 2697.171377] blktrace: Concurrent blktraces are not allowed on loop14 20:17:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:17 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:17 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)=ANY=[@ANYBLOB='grpjquota=./file0,uid>', @ANYRESDEC=0x0, @ANYBLOB="ff00"]) 20:17:17 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 32) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:17:17 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x34000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:17:17 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c00, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2697.483690] blktrace: Concurrent blktraces are not allowed on loop14 [ 2697.539004] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2697.539004] program syz-executor.1 not setting count and/or reply_len properly [ 2697.550931] FAULT_INJECTION: forcing a failure. [ 2697.550931] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2697.553631] CPU: 0 PID: 14352 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2697.555097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2697.556859] Call Trace: [ 2697.557422] dump_stack+0x107/0x167 [ 2697.558190] should_fail.cold+0x5/0xa [ 2697.559005] copy_page_from_iter+0x40a/0x900 [ 2697.559955] blk_rq_map_user_iov+0x138b/0x1a60 [ 2697.560949] ? blk_rq_unmap_user+0x750/0x750 [ 2697.561889] ? find_held_lock+0x2c/0x110 [ 2697.562761] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2697.563916] ? lock_downgrade+0x6d0/0x6d0 [ 2697.564805] ? import_single_range+0x24d/0x2e0 [ 2697.565780] blk_rq_map_user+0x103/0x170 [ 2697.566644] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2697.567649] ? alloc_pages_current+0x18f/0x280 [ 2697.568637] ? sg_build_indirect.isra.0+0x448/0x710 [ 2697.569702] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2697.570829] ? sg_build_indirect.isra.0+0x710/0x710 [ 2697.571907] ? vprintk_func+0x93/0x140 [ 2697.572733] ? record_print_text.cold+0x16/0x16 [ 2697.573722] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2697.574797] ? trace_hardirqs_on+0x5b/0x180 [ 2697.575728] sg_write.part.0+0x69e/0xaa0 [ 2697.576607] ? sg_new_write.isra.0+0x770/0x770 [ 2697.577583] ? find_held_lock+0x2c/0x110 [ 2697.578454] ? __might_fault+0xd3/0x180 [ 2697.579303] ? lock_downgrade+0x6d0/0x6d0 [ 2697.580213] ? _cond_resched+0x10/0x30 [ 2697.581047] ? inode_security+0x107/0x140 [ 2697.581927] ? avc_policy_seqno+0x9/0x70 [ 2697.582787] ? selinux_file_permission+0x92/0x520 [ 2697.583836] sg_write+0x87/0x120 [ 2697.584562] do_iter_write+0x4f0/0x700 [ 2697.585394] ? import_iovec+0x83/0xb0 [ 2697.586205] vfs_writev+0x1ae/0x620 [ 2697.586976] ? vfs_iter_write+0xa0/0xa0 [ 2697.587841] ? __fget_files+0x2cf/0x520 [ 2697.588684] ? lock_downgrade+0x6d0/0x6d0 [ 2697.589561] ? find_held_lock+0x2c/0x110 [ 2697.590427] ? ksys_write+0x12d/0x260 [ 2697.591237] ? __fget_files+0x2f8/0x520 [ 2697.592098] ? __fget_light+0xea/0x290 [ 2697.592928] do_writev+0x139/0x300 [ 2697.593681] ? vfs_writev+0x620/0x620 [ 2697.594504] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2697.595617] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2697.596725] do_syscall_64+0x33/0x40 [ 2697.597507] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2697.598600] RIP: 0033:0x7f952207fb19 [ 2697.599389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2697.603354] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2697.605047] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2697.606566] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000007 [ 2697.608088] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2697.609593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2697.611102] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:17:18 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:18 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:35 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:35 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000001900)=ANY=[@ANYBLOB="2f0880000000007c5e773ec7c914fb2ef037e0dd757abf5312ac9d4134ebf47699785d9e91fa064896a910d5a4701fd8268e65451730f0bcf5558670670c1a78ac51cddba08132f70f1033b06ca6ae0293a8c6088028355bf08027e8388535efd25fc488c5796101f5d278940ef77b99f451496673611c6ef18a8dfdf95bd6485ca7fdb2639b9e395a041acae56865e87e070315762df9dbd33778e58c50ea359bb4b1cad6976596bcc0495608163a8ce95774a2d48af103124097abf258413760ba7783bfca404d115c7789b8826f274fff8a46ad1f254abeb4cee9d0d4772e4547323be7717b"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) recvfrom(r0, &(0x7f00000003c0)=""/199, 0xc7, 0x102, &(0x7f0000000540)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'ghash-clmulni\x00'}, 0x80) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/bus/platform', 0x101000, 0x8b) 20:17:35 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x40000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:17:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xf000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:17:35 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7400, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:17:35 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 33) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:17:35 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:35 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00') r3 = openat(r2, &(0x7f0000000180)='./file0\x00', 0x80200, 0xc) syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) r6 = syz_io_uring_setup(0x3198, &(0x7f00000001c0)={0x0, 0x3b44, 0x20, 0x2, 0x27e, 0x0, r3}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000280)=0x0) syz_io_uring_submit(r4, r7, &(0x7f00000002c0)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x14, 0x1}, 0x1) setresuid(0xffffffffffffffff, r0, 0x0) r8 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r9, 0x0, 0x0, 0xfffffffffffffd69, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x1, 0x4, 0x6, 0x0, 0x0, 0x100000000, 0x12181, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xbe8, 0x4}, 0x30, 0x7, 0x9, 0x3, 0x1, 0x8, 0x8, 0x0, 0x7, 0x0, 0xffffffff}, 0x0, 0xd, r9, 0x1) ioctl$BTRFS_IOC_START_SYNC(r9, 0x80089418, &(0x7f0000000240)=0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000003c0)={{}, r10, 0x12, @unused=[0x7912, 0x8001, 0x1f, 0x5], @subvolid=0x8000}) ioctl$BTRFS_IOC_BALANCE_V2(r6, 0xc4009420, &(0x7f0000000380)={0x3, 0x4, {0x80000000, @struct={0x3, 0xffff}, 0x0, 0x4, 0x7, 0x100000001, 0x78, 0x9, 0x487, @usage=0xebca, 0x2, 0x9, [0x1f, 0x0, 0xab4a, 0x4, 0x60000000, 0x3000000000000000]}, {0x8, @usage=0xfffffffffffffa81, 0x0, 0x4, 0x6, 0x49c7, 0x9, 0x80, 0x1, @usage=0x6, 0x3, 0x8, [0xfa, 0x0, 0x4, 0x8, 0xffffffff80000000, 0x56a6]}, {0x7, @struct={0x4, 0xd5e6}, 0x0, 0x5, 0x4, 0x200, 0x1, 0x0, 0x45, @struct={0xb2, 0x5}, 0xfc, 0x0, [0x1, 0xffffffffffff8000, 0x1f, 0x7, 0x2, 0x9]}, {0x9, 0x7, 0x8000}}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000780)={{}, r10, 0x2, @inherit={0x48, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000000000000000000000100000ebffffff010000000000000001000000000000000900000000000000000000000000000001000000000000000100000000000000"]}, @devid=r11}) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000005780)=ANY=[@ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=r12, @ANYBLOB="d410108088fc8dba1800b679081d0a7ca484e04b45b01481e90a482acc1bebb527ab1aa79f9cbc5ec4852d4a45e314d87cd6db530b2ac130e984d6c30f62aac8aed9da4a0dd640c534c8886b1d3759d4e8a45979bc62d4925779e20055e68fe253f23b1e2731c822c4943010f0d566ee2a8f244da615bf3d3a1dc73afa0450f030704bacb0bcac64454a81a83374183e9031f11ba4a2830fa4351bbac1578c876bdf7adacd29673d791f6d454bb5010000002316588fa32e5d267bac917d7a6faf7aa353de75e35b9f17382ee76986d799a7f93bd6b1d166b15d032ecd0a2479005fbe1009d24d1917164c164f23b417e3ac3985e58ad1baf2f0fad17cb8ba328861cc47184d99183e52112e7d71733b3a8aa7056f1a6e1c818d2cc7e5f87f842fa99e156fe383cdd5860ad42910b97d1a8d1cb812e625a92abdf005bfca75bfb19c7faea688f52670bd68038d128cabaa680aec9a8be7096645f3bf3c05ed36480a2560ec413230f09edc03e793fd20e1e4c6f9297d2cd13bb7f081d326209faba4fd097745ce95702906e3927ad91724bb8e2955a8d30b50c06ca32451cd5cd837ce94f0d6270d0d76a994e25d9938c9796da0b507409495b4f4fc4cc60578ab6bf85d9281045c6857c1e94ea37cf6661110e08d982c2477213d02d6abba95fe679176995a0ed788dd1f464cd0c451b9f30723d0e112f7f3c75d2b1d7b40a3129564672fa1e7140f24879bda397f081f6d6d3731b9022546b41c317382be095a6f2b9c594c022623906120d22bf0bab6eb23fb4acc4c2ae12ea814891720197f5aa32ed07f78f4bf6906f984060cee8950fc3d55adb3528645c8e9e17d50c1fa266893e92846ff091cbffbdd468191ba29556b1001c31b3a39c9a81ed24825cbfc8b6695e5dcf05768023665e7fe9d7687f809333975b71a47ec15453c4387f1ff069cff956e08d4d82b89da7d25b60031b18bf6c4697e86f076ff7b713fec2b059794d17e290428c5c5e5d2b3b43007cfb89f7252be3e791f92bcee9f94ad66b1bdc19d39fd716ef9c97077efe94ac6ef8235181c6ab30da397e19dd958303034ced54c371f8cb35b1cc8e098e03b7135abbcf6d2cf453b8bd1181954a9a0467488735be026a13c7fe3039af95a58b153aa014e2ab3b38327bf2e2bf7a5f11a74fb2dce97e664402e45f8383d2f04c5b8df88b8a23a6be5b93a83b13e3994505697148befc6f1a59773465b54b88b4ca12cd8ad5745c78d36e4a5f35dcbb13b593ec44e94ce98a2450df2b9d85063b2e8b59e4cbb8e06ad476dc200dba7b03af6359e92285fe675824a7a28d2e8edeffbeba028e79ed44ec798688ec8b46dc026919dcc29f55a1c62f35d92789121d0f2ffc112fd5064bc1847980bf2525fd505d830e441e82f677f032437c7b7b969f5da136970454d32da9ceec1444bc1829484730c402a7829b6387a3f361122a99ed483dc8cccb441a858688ee5108ca769933e3dfa2e279dfd7420bc954a0fb25654150c88049ec37981b9ae548e58c042ca445c5c023b91a36d0cffef485ee42197cc0ee18fd92b9d59627379e14299291f0f2aa0b7498f6d5514bc31475902bd8dc8ce8e15881ec1c9e7c81a5e13fa773e8525af7d6958ee57b7d0e417819c5f5588919abeb0c64a5a960ad9f1cfbd5616851ec5af4e6fb440f1c80cc9300036338b4c467be62c3d6c2bf77994e213588ed4c96fe7a8f10dc375af10596e961591a29e90452f93e60b1130db9d5d1e5c5895a6eeeea7ccbf4fac800a8fc9e6cd0e0c695af90276549549617a4fa8b86f92daa8d7791a265e63776be7fb4cf2331f7b3875beb1689fb6b3eb7f223d274132a5010591f47a068d2a1b4315175b5f090691fc38a8472fb962bf5143b1c16f17f14f09f973978deaf8a9989f55484278e361c60f0fdf29850be5571f7993b2f6e3042d6d433547663afa54b5527844e615e2f9e5f2d461856e6866d28dcd8a31e9a8f530528b89c563e023720f67a5798cb0d9630190171d82af76d531f6988c242077fefede0b4292d439deb7879ddecf2758309507aa37f23002a11987974bbf7a1238207ea084c780b004e18440313b2c0e3674dfd6b2b7d37bc195c8d5dadf366d28e775a1d8c5e9803e5045d3faa55035f49bee39814f8827bacabf1c6ba135c9416e85c1cebd1b49673fa3a310bac147acc7e2bfc6f13f1f55bb7284d0eca42dcfdb135cfd492c7da0f32f270245a352694d0dc19f991c6ea2eb1c3490ed47792ba0284a53f02a770aada69c83806295572b4d347bac3df45921e9ccb585238b3e38c617a3c441f779c9176736d270d0e2aeeb8db0f4200be05cbc0b832410112082ef49814204b37584e322a03d71ad94f3cc0c4373b86f7b325231e9d5e9b215f4a5fe231c71f7d5ba538d649a05b051299c386eb60bb57b77e1a7ad0970dfa2c0025dbef323775ba3d714601a4d901edee147874ce1dfc3ff58c2c556eaaa778f63368d839cebfc5ef41d5e6b7af51def32cf37e29fda50fca65c59196a0083644f2f2b4a5c5158bb00f3a7b8e8b0af6dacf1edc537b02c7b973178da29a9f09dd5a5357602998eebd103266f7dea5d63c21f6e2d24c9dbbf5088bca93391f9350d5c6e20a4ac3789b82b41f948407ca1f4bd93b56b791fc21d38772b58dbaf7e89b1ace79338404c540948eefbe23ca7d87ccb8e436434a10b4a0d38d801c45cb479b7cb3836223cbcc512142048b967b2a9ac4193486437f4fb14f0466b202b81b604ec0c57c4c475ca144a9bf8c1f41d2a0908749171686d4a7168c872f386710272690bc008f4bcc7bc8f0255d1772188cc2759f504292e09fe090f7de2a968a6ab687054ee2aa4d14f762f4eab08a681b83cfa711df21980427fe378f4fbfb75610c1c7d92d89a852c81719b958b0e87215b4cfd6bdf534cb222ca20d12e0d30b96e763b91b0bbc86da5e8601ecf73875d08f1c42f56c1ace35ddca5d2d2049ae457ae631921924b2d0ddf282de86f8eabf6485e76f7a524cd76c389af0263c27baffed2b8c3662df3397304a3913d50a3ec06e8f4b3d025f6ed1bcabe5003d5c5f70ce45864c80e8fb08a414fd21d5413d43adb213f704cb3598e4be8e1b2059ad6b89ef50ad3777c76859e976d60fc6341e16679ad912b4f38d6da31870cc0ef4bffed5b88cfa31de138ab20df1321f79374ec1dc4ff3feccda023d8c0c1a3cad0dacf79e889c0c1edf1e9d8abb6ac1a63d7eb86405c8ea6382844425107ca9e2a34cf2c70805b1b472f34a290346a2c6dc198f5737f478e9c60145b98e9cd7a45d3a7a143f4b366ffb2e9ffb376957d9a4d393be973811f584f60ef8205010bf9f3ee22247420175d52f99504a23c7d8432ff5fbf7eec64970d628c7d179bd80848a01a77ea4ddcb52773f75cf35088b25f2b4e50f4df071ce263a2783772c7a58694d4c6b6f79473d7792e80707103e9c1e8a3a8ec85b8c24284775c2e8c74b7817164d96ab146fb9a0beddd9f46ba0550d86012434aa3d452341c211f0ce3f67a21b2ceb7d9194a1a13820a04d74f32b0348f67d3dddcf5e3fd07d558cbed2fc99728d98a11540c155a8b8a6a6de55e193f076ee35fbf8ddcd6cff264ba9827bb9bb0fc0b71d84231ea39607c11d212bca63799bbf2c4e4b923ba1493a6d3372eca8cb13a3cd790f2318b7d20b5f4d43ad7d0d04cf3bc757d9492675a21fdedee3b64e0bbc3f74ea6fb699603be3e056b10e119a4b69ffad647f5917904489a01c4d7fa45aa6dd632a3ee9b0439f72505b3806dc39c70a6d5f8a1048cacbefeeef1dc0a196284f07d003215ff947bb969b5eb96729a547119a94c321b55c9b14cda0936f3199297eb706ce6ebda82bc16f7680afd382809854a0d509f1af5b9d8099bc740368316d9f6c55a72c2f8eadf6fd483f3adc63415d86486dfc9ce5c1708985776628e663733d025296c9f270bead699253d6be258fe3b3d9004449efc0e4adbe55fd6442b73442fefc8fc798d344941275ba9af1d637245206b5cd200182f073dd9d4fd8fda02ce368b3948244b8e8cf1270978b3cbf24d21eb86cfa4b4bf1c9f92647319ee4349137485d4d9757cc06e62fb2093e94c7060a1e972d497816275c0fecf2f78d829fba5720a32f6375742d347cdea8e3bd8687f7ecacca7f67520299c228fd5ab189a0a470b3829da508b38bad3506d8238160b8e6ea88cd960b78af7a76baeaeee6f98d9fcb0ac9a872257b19ffa78ee8482c4e2ca5d306f5358d9ed4f7c7ca601a028cd55e5265a90a7485366797b6efccc39687e7fb4358b7b88209ead4459d4f8e2b38f44bab085dc2e25d0eaae8ffeb29e2321996fc4414b6c3906ed45dbda834b0995775d218d26883429784895643cd3be779b3f02001a40a6c4c29f6d761d709d0c078f7f02e419ceb7fb97b05b9923bb03e04c25189e45331fd23f555cba07499f0eac22a37c5e20404ae8e1a704ac9b40708971873146a42d0acc49c88233b4a5190c313d5439a5b8f2e98d6bd0cfdda1d4bfa87293196339ff760b5b8d5d54b9a19d784369dd9f19b7223c053997f736479c0a9613838760ceba0486f65510f97f89a57e165685cdef604028f2b733dbc188a7df32902de342e913f3bd79e9e87ede9d32efc8802a481e8132ad5e26bb46c13073f22b38d067ac916e9147f3d1346a4ba825d0f93a48f976742ac294006a4df1a49e6fc5104157957bd9345a3919027ac1797475be50fa967bf57905e19e122562c3aa9e0d1f3ea2082635bd9ee670c3f6aee1264c3febccb415a0e7f565728005eacbbddac7394ac6edb6e64b560a288c1e0d7ce660ffa546ae5987080252a34bb48f18d16f00262975b9cb99e2dbf5c2907c126a33df06b4be48136f1629363492f5b8c3f6091801ec634c999a9d911705f1c32d47142cf96e61b917d6cd50b808fa6b507abf6cd1acc35d78f80ea31a491b2a6428dfc7e59101ec1b3e1426b446c7893bcd65c266d2f9dfe9b37a5d18727ec17c723c43b6907553be5c8ceb1098f4361b7df56a5fe52111bcabacff893eeae4a8791fb600000dca02321c7764e9f6e8e50d03be44ad05d514fc500ebf882fdb173fbcffb8698855d29b67c3f23af7fb37a3c2ceea08f8a3ccaa161018898e3b6f418eb43c531bfb3e7fcf7f22fff6fb1e2ff37b106fc625c4248a436ab37aca6f78ea5be435b1f832b78f1015d2f9e8003169941ca4d0e6ad90367c1b944af355a42e78c16878bae6d9889fb862fdf22fdad1ec0d433d4af889e5e031cc435052e6b10cf84e127beadfcdbc64565b4e7e3491b33ba591043676f60e9ba1e9a26ffd1600dc5a1e4b8fbf9d3baee792e4ac98dc85e0f2c33e4054e4cd199ed3335a0bab0696257a6c730316b35c8e7eda4ed9c7f6e55308b8bc9cfba6a232d5fa70b3342bb1fcefb7243f330dce434270dbfd8a193625038ce159b8ea67c5291edb9d40df80cd54e508a42a3351a99c22999028a57d9607bb459a1b2b0c11bc29a995ca7e14ab386b95f8e2e777c41bfcccb73560e8a79ec3200e7809c71c766b25e0c3f3e65e616ac433e99b84c248f5a3a4d32474e6b07372a62d4d61106875dd79374b332fca32aa572f449c5a36521a8a62cd5e322c6f68c74e443dde884a321ba78601ae2b33b06a09eacbfc8a1d188c3177faaf355dd1f4075adb72d341af7ddad762942c9a07881942c22ababb1270233f769525b72e6ab55fcb2afafd188c9e9143290532556a8b185f0e5796296323acf3f971140610952eb9216206c065470d208e8aedb4ae9c9e2674301f06d8745967b033e34e56e96ea798bbc570ab37111fcbf67f6d302e4f65ec405fa6b179ac3d98820242a5d06a1895d6d4de36f2eac617d1852bc40048d7679f00296435bcf51742f76c2661a9c476ec6ed0bef672a0f63d86ddf2be055c78299f08a0eb3476661442a923b49d603460a38b8efc3b820ed96a2088580c9f18a04721532bd296dcc06847ce2a95a694a83e9f217a2d6aee384714009200fe8000000000000000000000000000bb040079001d2cd45ad308004900000000004a3dbcbfa055cc9e147e156a739358ba45b1e74ef4fb57216da180c7a328dc1b88a61ec8f9c6f1dd541ce3cfeb62765d43c3508281107419fe9ff6801c77b580704876f8c5a148ac22394542a565030f79d7b2da04c1ed5deab11980cdfc0358f6387aa006b416732090685ff538220d89f2f1e7487db6ad0f7a70f686bc0adda8568fa7222b8fb67880da747d65a271a31f4e5243229787f51eba3d5d50d292e1483c7482a6543f2d61349baf756681e8cb7a83d6e72e996e879c9d2a", @ANYRES32, @ANYBLOB="21002b002ad7e978acd58174febc3a4abde5a35fa97ddb701bfb05755cf3d4cdf900000000"], 0x38a0}}, 0x0) [ 2715.381602] loop1: detected capacity change from 0 to 33559552 [ 2715.562763] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2715.562763] program syz-executor.1 not setting count and/or reply_len properly [ 2715.566833] FAULT_INJECTION: forcing a failure. [ 2715.566833] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2715.569541] CPU: 0 PID: 14394 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2715.571018] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2715.572801] Call Trace: [ 2715.573356] dump_stack+0x107/0x167 [ 2715.574129] should_fail.cold+0x5/0xa [ 2715.574921] copy_page_from_iter+0x40a/0x900 [ 2715.575875] blk_rq_map_user_iov+0x138b/0x1a60 [ 2715.576876] ? blk_rq_unmap_user+0x750/0x750 [ 2715.577810] ? find_held_lock+0x2c/0x110 [ 2715.578668] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2715.579765] ? lock_downgrade+0x6d0/0x6d0 [ 2715.580647] ? import_single_range+0x24d/0x2e0 [ 2715.581603] blk_rq_map_user+0x103/0x170 [ 2715.582443] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2715.583436] ? alloc_pages_current+0x18f/0x280 [ 2715.584429] ? sg_build_indirect.isra.0+0x448/0x710 [ 2715.585472] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2715.586573] ? sg_build_indirect.isra.0+0x710/0x710 [ 2715.587620] ? vprintk_func+0x93/0x140 [ 2715.588508] ? printk+0xc7/0xf1 [ 2715.589225] ? record_print_text.cold+0x16/0x16 [ 2715.590201] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2715.591264] ? trace_hardirqs_on+0x5b/0x180 [ 2715.592194] sg_write.part.0+0x69e/0xaa0 [ 2715.593051] ? sg_new_write.isra.0+0x770/0x770 [ 2715.594012] ? find_held_lock+0x2c/0x110 [ 2715.594866] ? __might_fault+0xd3/0x180 [ 2715.595696] ? lock_downgrade+0x6d0/0x6d0 [ 2715.596604] ? _cond_resched+0x10/0x30 [ 2715.597411] ? inode_security+0x107/0x140 [ 2715.598276] ? avc_policy_seqno+0x9/0x70 [ 2715.599120] ? selinux_file_permission+0x92/0x520 [ 2715.600161] sg_write+0x87/0x120 [ 2715.600873] do_iter_write+0x4f0/0x700 [ 2715.601729] ? import_iovec+0x83/0xb0 [ 2715.602528] vfs_writev+0x1ae/0x620 [ 2715.603291] ? vfs_iter_write+0xa0/0xa0 [ 2715.604150] ? __fget_files+0x2cf/0x520 [ 2715.604985] ? lock_downgrade+0x6d0/0x6d0 [ 2715.605848] ? find_held_lock+0x2c/0x110 [ 2715.606697] ? ksys_write+0x12d/0x260 [ 2715.607498] ? __fget_files+0x2f8/0x520 [ 2715.608354] ? __fget_light+0xea/0x290 [ 2715.609177] do_writev+0x139/0x300 [ 2715.609920] ? vfs_writev+0x620/0x620 [ 2715.610773] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2715.611870] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2715.612969] do_syscall_64+0x33/0x40 [ 2715.613760] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2715.614836] RIP: 0033:0x7f952207fb19 [ 2715.615611] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2715.619463] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2715.621090] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2715.622590] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2715.624033] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2715.625873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2715.627632] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:17:36 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 34) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:17:36 executing program 3: stat(&(0x7f0000000000)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00@./file0\x00']) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:17:36 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a00, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:17:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:36 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2715.878360] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2715.878360] program syz-executor.1 not setting count and/or reply_len properly [ 2715.882446] FAULT_INJECTION: forcing a failure. [ 2715.882446] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2715.885157] CPU: 0 PID: 14411 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2715.886689] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2715.888523] Call Trace: [ 2715.889112] dump_stack+0x107/0x167 [ 2715.889921] should_fail.cold+0x5/0xa [ 2715.890784] copy_page_from_iter+0x40a/0x900 [ 2715.891794] blk_rq_map_user_iov+0x138b/0x1a60 [ 2715.892845] ? blk_rq_unmap_user+0x750/0x750 [ 2715.893827] ? find_held_lock+0x2c/0x110 [ 2715.894742] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2715.895920] ? lock_downgrade+0x6d0/0x6d0 [ 2715.896853] ? import_single_range+0x24d/0x2e0 [ 2715.897870] blk_rq_map_user+0x103/0x170 [ 2715.898761] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2715.899810] ? alloc_pages_current+0x18f/0x280 [ 2715.900848] ? sg_build_indirect.isra.0+0x448/0x710 [ 2715.901967] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2715.903140] ? sg_build_indirect.isra.0+0x710/0x710 [ 2715.904258] ? vprintk_func+0x93/0x140 [ 2715.905123] ? record_print_text.cold+0x16/0x16 [ 2715.906139] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2715.907243] ? trace_hardirqs_on+0x5b/0x180 [ 2715.908212] sg_write.part.0+0x69e/0xaa0 [ 2715.909102] ? sg_new_write.isra.0+0x770/0x770 [ 2715.910228] ? find_held_lock+0x2c/0x110 [ 2715.911126] ? __might_fault+0xd3/0x180 [ 2715.912004] ? lock_downgrade+0x6d0/0x6d0 [ 2715.912955] ? _cond_resched+0x10/0x30 [ 2715.913816] ? inode_security+0x107/0x140 [ 2715.914719] ? avc_policy_seqno+0x9/0x70 [ 2715.915610] ? selinux_file_permission+0x92/0x520 [ 2715.916697] sg_write+0x87/0x120 [ 2715.917392] do_iter_write+0x4f0/0x700 [ 2715.918249] ? import_iovec+0x83/0xb0 [ 2715.919089] vfs_writev+0x1ae/0x620 [ 2715.919871] ? vfs_iter_write+0xa0/0xa0 [ 2715.920723] ? __fget_files+0x2cf/0x520 [ 2715.921550] ? lock_downgrade+0x6d0/0x6d0 [ 2715.922411] ? find_held_lock+0x2c/0x110 [ 2715.923275] ? ksys_write+0x12d/0x260 [ 2715.924103] ? __fget_files+0x2f8/0x520 [ 2715.924897] ? __fget_light+0xea/0x290 [ 2715.925672] do_writev+0x139/0x300 [ 2715.926388] ? vfs_writev+0x620/0x620 [ 2715.927150] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2715.928216] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2715.929178] do_syscall_64+0x33/0x40 [ 2715.929983] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2715.930953] RIP: 0033:0x7f952207fb19 [ 2715.931666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2715.935121] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2715.936552] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2715.937855] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000007 [ 2715.939113] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2715.940356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2715.941595] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:17:36 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4256d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x3157, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, r1}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)="b3c79ec65a96efede6903ebe11ee187b0fb5bfff1cb97096846909a1334f901f18c3366f27a5d39529ab72c576f2e1875571ed5ec82772d232dc50c7a6c8612da8ec2b3b0c3036f40ce19235e9e8ba73da6fff1286e7002ab06f437522deed2a27233416723bd267df8bbb85460fe7fe76fb38cd2d0bfb3b7138d26f320bc9769c63b157d74965bfd18d848627c16434c4fdcdb617d9aefc9f85d04d974f6e31cc4984b23c8a7d44ed265feca49ca3ef789ba2fadf6387c34b9d826fc95ad716e35e7ab7c0", 0xc5}, {&(0x7f0000000240)="2cd259aecea187a75f56d88eec2e5531236a1545918e1c7486c5faef86a200e1056205728e3e296de8c687fe0fa349eaae2c8a2a8eace5b9bb00025d0bea80a85d5aa3e910a267721f3877f5b5bc850e99f83a585ac5dde53f139bd8af5a5505199fe0c8a5dd03eb825454c45839d9c946cccbbbc36de88c97f475f7d7b4045a32647ebe1f3151d77a1e845d31f655beb78e5a60773c072770ba70266f09dbcfc58ee4175163fc44ea98edfe4c", 0xad}, {&(0x7f0000000300)="8573931f6c8ea5e11f50659fc04c74a72b9dff03fce31609d2ca5f2e9f468f131de4996583ef78f164884e2727d1e74e9897f1db1aa81e5c02c0b3b7b8140b75bb5e238ea7db8bbf78b3cc38c28874a6c988b6a0520f54622830f234720a8bcaafac40de2e368d25b8088f83ebb1654957dcf837732f0e", 0x77}], 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000005f0a5e477fee923d0831d524e07874798ee34ba866f4b70755e8c0929db9b8364daca54f316882f262c9cb60b2824d9f181443d0556a630555d0d46cf6918bbb0a1b5532b22016e777c1f9b17e8018390eb1f35e436fe115495ea46a04e27bf44de84408b6d4e7cf648177a10cf3090904fdfb17a15cc1d30f855f5d2984321fd68fcce9b73f97a50575866c71c535a92b0aeb6ffbe20353cb3", @ANYRES32=r2, @ANYRES32], 0x18, 0x84}, 0x80) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r3) 20:17:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:36 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setreuid(r0, r0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:17:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x11000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:17:53 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x910b, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2732.967773] blktrace: Concurrent blktraces are not allowed on loop14 20:17:53 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 35) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:17:53 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x80000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:17:53 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:53 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:53 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) clock_gettime(0x0, &(0x7f0000001640)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000014c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/160, 0xa0}], 0x1, &(0x7f0000000180)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}}, {{&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000280)=""/150, 0x96}], 0x1, &(0x7f0000000380)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f0000000440), 0x6e, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/223, 0xdf}, {&(0x7f00000005c0)=""/78, 0x4e}, {&(0x7f0000000640)=""/66, 0x42}, {&(0x7f00000006c0)=""/177, 0xb1}], 0x4, &(0x7f00000007c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xe8}}, {{&(0x7f00000008c0), 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/139, 0x8b}, {&(0x7f0000000a00)=""/3, 0x3}, {&(0x7f0000000a40)=""/186, 0xba}], 0x3, &(0x7f0000000b40)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f0000000c00), 0x6e, &(0x7f0000001200)=[{&(0x7f0000000c80)=""/204, 0xcc}, {&(0x7f0000000d80)=""/232, 0xe8}, {&(0x7f0000000e80)=""/129, 0x81}, {&(0x7f0000000f40)=""/104, 0x68}, {&(0x7f0000000fc0)=""/15, 0xf}, {&(0x7f0000001000)=""/163, 0xa3}, {&(0x7f00000010c0)=""/26, 0x1a}, {&(0x7f0000001100)=""/251, 0xfb}], 0x8}}, {{&(0x7f0000001280), 0x6e, &(0x7f0000001380)=[{&(0x7f0000001300)=""/88, 0x58}], 0x1, &(0x7f00000013c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x100}}], 0x6, 0x2121, &(0x7f0000001680)={r1, r2+60000000}) getresgid(&(0x7f00000016c0), &(0x7f0000001700), &(0x7f0000001740)=0x0) keyctl$chown(0x4, 0x0, r3, r4) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0xd, 0xffffffffffffffff, 0x0) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xf1c, 0x3}) [ 2732.991998] loop1: detected capacity change from 0 to 33559552 20:17:53 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="2f4bcfcc3c0f000800006fb543fccd14962e3cf847db766641c21d0000eee36d6a5ff9db0a615fcd036be8bbc5460d30a5b764ccb68e82d9229048e87153769d9582f1e4779a4f363b569f99ed515c0f349ce3bd19ffda5b0f3c5e3c66dddff1c42da19aed2fd04fc7c74fe1497e3b1b00a5ed588f9cc99bdebf7450443e903c2fd7c85622279c6dedb2ea57b1c0b68c21ab01d82e9889a7ac7b5ad694eaaaeedc870ba757677c93aeae8dd5f972bdf875d77ae02a"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:53 executing program 3: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2733.115166] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2733.115166] program syz-executor.1 not setting count and/or reply_len properly [ 2733.117866] FAULT_INJECTION: forcing a failure. [ 2733.117866] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2733.119496] CPU: 0 PID: 14470 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2733.120481] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2733.121620] Call Trace: [ 2733.121990] dump_stack+0x107/0x167 [ 2733.122496] should_fail.cold+0x5/0xa [ 2733.123022] copy_page_from_iter+0x40a/0x900 [ 2733.123644] blk_rq_map_user_iov+0x138b/0x1a60 [ 2733.124300] ? blk_rq_unmap_user+0x750/0x750 [ 2733.124914] ? find_held_lock+0x2c/0x110 [ 2733.125490] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2733.126236] ? lock_downgrade+0x6d0/0x6d0 [ 2733.126803] ? import_single_range+0x24d/0x2e0 [ 2733.127439] blk_rq_map_user+0x103/0x170 [ 2733.128002] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2733.128662] ? alloc_pages_current+0x18f/0x280 [ 2733.129295] ? sg_build_indirect.isra.0+0x448/0x710 [ 2733.129983] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2733.130713] ? sg_build_indirect.isra.0+0x710/0x710 [ 2733.131401] ? vprintk_func+0x93/0x140 [ 2733.131944] ? record_print_text.cold+0x16/0x16 [ 2733.132622] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2733.133325] ? trace_hardirqs_on+0x5b/0x180 [ 2733.133927] sg_write.part.0+0x69e/0xaa0 [ 2733.134488] ? sg_new_write.isra.0+0x770/0x770 [ 2733.135116] ? find_held_lock+0x2c/0x110 [ 2733.135674] ? __might_fault+0xd3/0x180 [ 2733.136220] ? lock_downgrade+0x6d0/0x6d0 [ 2733.136806] ? _cond_resched+0x10/0x30 [ 2733.137338] ? inode_security+0x107/0x140 [ 2733.137911] ? avc_policy_seqno+0x9/0x70 [ 2733.138470] ? selinux_file_permission+0x92/0x520 [ 2733.139130] sg_write+0x87/0x120 [ 2733.139595] do_iter_write+0x4f0/0x700 [ 2733.140131] ? import_iovec+0x83/0xb0 [ 2733.140660] vfs_writev+0x1ae/0x620 [ 2733.141160] ? vfs_iter_write+0xa0/0xa0 [ 2733.141703] ? __fget_files+0x2cf/0x520 [ 2733.142244] ? lock_downgrade+0x6d0/0x6d0 [ 2733.142808] ? find_held_lock+0x2c/0x110 [ 2733.143363] ? ksys_write+0x12d/0x260 [ 2733.143896] ? __fget_files+0x2f8/0x520 [ 2733.144452] ? __fget_light+0xea/0x290 [ 2733.144983] do_writev+0x139/0x300 [ 2733.145469] ? vfs_writev+0x620/0x620 [ 2733.145990] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2733.146706] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2733.147414] do_syscall_64+0x33/0x40 [ 2733.147923] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2733.148634] RIP: 0033:0x7f952207fb19 [ 2733.149142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2733.151672] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2733.152716] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2733.153686] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2733.154654] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2733.155623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2733.156603] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:17:53 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa901, 0x100, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:17:53 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2733.229788] blktrace: Concurrent blktraces are not allowed on loop14 20:17:53 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x6, &(0x7f0000000480)=[{&(0x7f0000000080)="50e00269c6376c739a3d7ef678d1e332b3233ad77c1e3b6a7c08d9ad86c8d024c0bbe9632df214adbfbcfda9fa54e8162d1f538ed95deca8c0483edc3ac43ac7eff34925ba77e97cd324ce4cae49ebed52f73998003f55f2869702b189a79ff3b924bd7835f37732db3e52a894b12dc451545fcfc70fbf834d7900d8c48bc2e574367d50e5617bc915ce3fa084d852989643d0d9b4ad31f22c3ef5bcff9d03cc78eecde46745286e6c48d8c60819fef36985b5745c965f7e24", 0xb9, 0x7}, {&(0x7f0000000140)="4d21c11debd8b5664f39d77612b8c1afb8099867ee494cb0b16a8e1c585ac0c540f29f6d61181f1a33c1204769ba646899718788ec95b74ed30c7aa3d1f73e53ed1e432688adab247c2b053e4dfcc4c49369f0a0d23292be6c8e7cf374c92381e3b6c18bb0864d00aedd1bc5b32ac57dc08513b1ec6d39d6c5253abaa470a6a71e248ebff9abb083a1b24ee0f47f1e496e12303cb7b8aa9c884e0abdf5b2de1e56535473c1196a0e6ffe618e720682b3", 0xb0, 0x2}, {&(0x7f0000000200)="73c4c3de428d896bbecab95f3e6d55d27cbceb8e1016d0b27c8380e9cd5d66310c5c632edf7c1ab1489ecf7ca4d5b73057a36a278b856e335dee7c03130c3395076018f302a561434d8583c7b5270d935014c14f73977973c1a1cdc2913f", 0x5e, 0x1}, {&(0x7f0000000280)="4a98bcf20b723df33c3d000885d805628d2cf9d7c95197af4660e5b6671cc390c97046cce7f581b27c902da769c26976214b6c9644f9fc147edd94140dd704b313bebd12ec3c16ef7a274a959f046af97ed82c1a772e0ecb23bc509383cc1ea0fc4d", 0x62, 0x1}, {&(0x7f0000000300)="ed597cdbadc1570dd231e0bab4dd3045a4aad442b84595bda6386f29717cf773232b44d90745838ed9e59141912ad091fd84e71749ace856422b426e22d5c4066a151e2fc26cd896759f98dd1d48399b59fe93c5fac7c9d55198a270cda6a34546e204302ab0dd296808033fd7677de42aa9b7efa61cb1322562ec82acf439078366", 0x82, 0x100000000}, {&(0x7f00000003c0)="a1e4538ec5e791e0c9159a14ff5a5fe7f81f1ea8f2bb07287bb9dc353b9d305236dc4cf2a16d302c467a9504ff90f871c59735fff46fcf52ff3fe2cbaac763af519d69dd48db0e5148e904782839fbb9b80616e8ec3343e34de44e166cd46d761b84a40538c7d8fc002d21c3533e9e6d0d169b6fe443d68454a413875a60b5974c683f3ca83a3b2d895651924f4b261ffffdda66dd", 0x95, 0x5}], 0x2004000, &(0x7f0000000540)={[{@bh}, {@grpid}, {@grpquota}, {@nogrpid}], [{@measure}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x32, 0x38, 0x32, 0x33, 0x0, 0x63, 0x63], 0x2d, [0x66, 0x62, 0x37, 0x64], 0x2d, [0x33, 0x66, 0x36, 0x2147fc4b7e336b55], 0x2d, [0x36, 0x37, 0x65, 0x31], 0x2d, [0x34, 0x66, 0x31, 0xc, 0x33, 0xa360d4e11ffdf7c1, 0x37, 0x39]}}}]}) 20:17:53 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:53 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0xffffffffffff7fff, 0xa, &(0x7f0000001e00)=[{&(0x7f00000003c0)="83fc0e1d1140ed919f3946b4e0c9f38af6bf901eb5fe6a68692df4faa705", 0x1e, 0x3ff}, {&(0x7f0000000400)}, {&(0x7f0000000540)="493f4d38ce08de1d8df44ec79ad2efad89ed1a81c870dda0ba00223f9c933b3108aab2d4f80b386e24b32bba2f31b6af916920c3ec3d47a341541a1782c00dd077b19f37a3567b99d7a8d1ab2c1def5b34060a1fef941a15e0891b83bfd3fe112b18262330cbd3f4f9dc50d6cf8f71e8041f13dcb8a33a124bce624acd0fe68b5953df8b207e13e7f5e2e1cccf7b6aa6caaff7484a4f74a7ef033cee20aafa67e4712332d0ad9481f5a10ad0e2d74a57bbd2e274", 0xb4, 0x3}, {&(0x7f0000000440)="0d10af82a87106cceff1716f31745c510540a5255e91c0dea08b7c6750318b03094a7be49bba2a04eb62f79b19430207cc3322871841d91746aac6b969af353f01", 0x41, 0x1ff}, {&(0x7f0000001900)="159ee22961ea8d3f574fef4cf532a67a0669999410b419084906a5fa9a4a910a80f24cc809ffad864ab2617bc65e80bdc8dfb09d6afa5df617a3316b2898215a76d50601435cdb4eab6547d9d2b6ba0d7a8177570dcf0a7b2af344b50bdd388ea4d716e3f41f4ac0b81ad9ef1a8f8c64f2e8599f5acbee4aff4b5fcc728972d594ad9b7118d1ce3388d52c988af996f0ed34a269ce047114b7edbd1c6744793a2fc70ff7263f938eba974bc4f3a5bf168dc7945b50b0462e1e3d2836ac970f15ac640ed76bb7095cf2f900e38c0771dd49010cfb0f3a117991e964efcef0b668e19f8eed9e79b5f3a12ca551464bb0ec3b25", 0xf2, 0x40}, {&(0x7f0000000800)="c230b69f52521d21e543e3ed8e6883292647a87705d24094c0cc8622c1145c12d491aa65b12439413921bbf5a3a0e966c47e9759ae1cc1dfde674345616713a6ec7286ef9f72c64a190797ef589e1c7fc8e0e021d6e52a941c0492b018fd60af86270a85c3ec980e6ca6d46adc6ad87c32", 0x71, 0x3f}, {&(0x7f0000001a00)="34bbddfce9", 0x5, 0x3}, {&(0x7f0000001a40)="610d0cca15fa1f00afddc9ec3576b01d37eeef8c30538f41584dde38c29ced6c860b4a3a7a318e041322c42786330e5444a79812aafe678ccbc364ea16d58bea82c071ab277fd6a0074147498850b350beafdc3ab58419427d5354c31828eff031f6eedcdc098de338b413e6173a06dd898f922a8d9960ed09101774791c5e81bc1ad5adbb915a72607244a5a5c816315939122651f49d1010f530f336", 0x9d, 0x80000000}, {&(0x7f0000001b00)="c8e673edd2b33135e218746bcd3d2a0570873ba390c969f9504a3505e1e6347668e87f558004b930b559db767f58082a7a10076bb2686bd23675c753f60691d10867edaca4b8cd858b2c862d1f20bfddb3e310d3177c6197279ab80d9b16b2ba05905e64e9e223ac50764eff7807280c11c3321a05610e8fec852339324c677efff488311f95f2d0176ee3de181a45f55b8248c82ea15f15d8e56b279bb75d6ab68165bbddf3767bc87443211b3c99727f2200d4b3d1bc5ee461eb30c8ad08e90dee6f15dd4e5a", 0xc7, 0xd5}, {&(0x7f0000001c00)="7ba1551b58605169cdec80b5d1bd1c54f739cd04bc348fa92515186b86f4eaaf989a971fdbb4ba747b3f30a4c92faee69611f482376413e3ea81fec42b234b59b24b62bcc269991681a7620a46f31ea69c2d8de9dc795535757ed8f0906a5b801f5a428636a30c82d27ac0ba63469692fe392eb35adf71a5770988207c2953e6647ac23d4e1e7ea9c46ebf4eda16637d9c49d551aed510b4e87a9674de5c132219374ad76fd1c21e16c167060ff781aa2e43fafbe582e475171a3f3dc4fd7f7c5f", 0xc1, 0x101000000000000}], 0x0, &(0x7f0000001d00)={[{@numtail}, {@utf8no}, {@shortname_lower}], [{@dont_measure}, {@uid_gt={'uid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'hugetlbfs\x00'}}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') getdents64(r0, &(0x7f0000002000)=""/4082, 0xff2) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f0000001f00)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf451ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8337b9732f00c9c0e9476d7b1c5043a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b0000", 0xf0, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:17:53 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000800)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000700)="6ff37d03e0c45f27b8be4e72b934736b8c2cf3ce54a62427034fcb55dddc84079746015656e5fe6dddc36e4071c6dccfccca0cf63b59ad53613b4859efefdec063382990d8a95e5041cff9ad90062262e95dd3084f04a1aec8b452c6f7fd7160093101c5a2c73e6bef6907e1a011b8bf42ea0a5fdf64fe69569356a68ef4ec5fd2e639f66cad1250413a95cd4d0d5fd5264fad527fd039ef60f04eabec1e0243c745da2f83160e1f6ed654de3cf11f72e38386a986a390ba2a9cb674dd3442a8d5254c870fe9fd7f7903", 0xca, 0x16a3, &(0x7f0000000840)={r3, r4+60000000}) clock_gettime(0x0, &(0x7f0000000680)={0x0, 0x0}) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f00000006c0)={{r1, r2/1000+10000}, {r5, r6/1000+60000}}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x80a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000000500)=[{&(0x7f0000000080)="c9aa42338a77306af242882cee14e832185291ebdb2c2313985d9cf29bfa9d877b975625ffe0bd20ff4799af29c678e95878e04239cf5dd5058faeef4d1668bea4c5e2d0caf93da01835ddf8a02d9d8ccd1abbcdd5e1a4f0f2cc73debbe26b18fc1159437205d6ff04fc0a514f945709ef098c76749c819c3e4f799179ccd1f656cf4097a87281fee3d30aac10f6a1a2189456ae8cbd1c8905c18ae37a1ed6729a9c22e590201f588aa898628163c47832977d808735bc7399bf777f7499c8f08165dd261b36506262398bd1e3f746be34dfc7b6b78326eda1fd8cc2b1b86f0e973abf1ae22a29479322fb037d53", 0xee, 0x7fffffff}, {&(0x7f0000000180)="8e3d87c2c259f126a78930644c5389b37ab3203840d51f7093e203b1c599fcbee32b7bf75b5283b6cd86a718787cbcf539adac5cf65282f2bca52389112c285b77fd348337df7cfd54354b194e726516d86b0a8f3ee8bfdcfff4a3ba52a01cf97d83e3dfa55c507e3af6ab6397db262a8ef56bf5acd9759b712fe4fe8c875553bb4d1b69dfbec5b0dcadf442544e719cafbe01a3b730e6dae892c6b3836d2cc725126b2d6b62a74209e1543c90eaba4673db9710d60a9a1dd34d007a14aeb720684e1d3a1bcd4d3cde8981c084631f09126e520d2ada3de2cc0c5cbdbc244efa8370c14ca691cfbfc892f51108f793c79069b246cadf6f75", 0xf8, 0x1}, {&(0x7f0000000280)="703c224f6aef9e8409e7ba6be022a45d7c3376e317ca49b848bbf2b2c6b3866c3f04ae42d7ec19717e8a542ea516bcc331e3d9798c17ed43d2b7f0468bb0dcc9884e5f5f910ecd35ebd3a92133add990b505105685701daf9eafd557f4eb1246fc85de867dc12cd0ada6a936d645cad087ebc00c10cdba4583978d88963ec3ff39c3", 0x82, 0x5}, {&(0x7f0000000340)="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", 0xfc, 0x7}, {&(0x7f0000000440)="0112fbb838e76f4888b0129934a23a92983626c9bc7387861daa0ea38be4546edca9e13a84b1acceabd9b0aa97992268c6369b762951c33a95bf1e173a2bbb8734fe389d1e9fa435fa504154e6e2fee333cc426c400440cd382c4f6001041f2b6a47a6bd937948059e146dd193c5ff4fd06192f6cb5f4984e7d004df3c532c99798f570b87f76463caa05b06892f10f2226c684d7f29181fd67e398e4186bd3fbc4f876073", 0xa5}], 0x800800, &(0x7f0000000580)={[{@nodots}, {@fat=@check_strict}, {@fat=@check_strict}, {@nodots}, {@nodots}, {@nodots}, {@nodots}, {@dots}, {@nodots}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) [ 2733.423692] loop3: detected capacity change from 0 to 135266304 [ 2733.425418] SELinux: duplicate or incompatible mount options 20:17:53 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x3, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2733.470289] loop2: detected capacity change from 0 to 135266304 [ 2733.488412] FAT-fs (loop2): Unrecognized mount option "dont_measure" or missing value [ 2733.491714] blktrace: Concurrent blktraces are not allowed on loop14 [ 2733.538524] loop2: detected capacity change from 0 to 135266304 [ 2733.550833] FAT-fs (loop2): Unrecognized mount option "dont_measure" or missing value 20:18:06 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:18:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x20000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:18:06 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYRESOCT=r0], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x3012480, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10100, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) dup2(r1, r3) r4 = syz_io_uring_setup(0x3ade, &(0x7f0000000140)={0x0, 0x7470, 0x1, 0x2}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000003c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0x8010, r4, 0x0) io_uring_enter(r4, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r4, 0x8030942b, &(0x7f0000000340)={0x6, {0x1, 0xb658, 0x1ff, 0x7, 0x45c}}) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f0000001900)=ANY=[@ANYBLOB="6772706a71756fdd007569643e", @ANYRESDEC=0x0, @ANYBLOB="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"]) 20:18:06 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x9, &(0x7f0000000500)=[{&(0x7f0000000080)="d4a3ab0c9ce5464cf368319eb1f78d19b3b03930e4eda078f2a910b86bccf8c5b8a7931643e4cf5ca0e4ea587fb0d5339adf90ceb5b08e6579ff7c71750deff99ccb69ef19bad5c9a1c5365abf17abee6db564c1b03659cf52b9b2d83bfbe0a682013e0869cd2c46c808b46e82f0e3bdc56f0088c9799e0ba19212a71644ab72a901cc68c436b09861e46d71970b65aae7", 0x91, 0x5}, {&(0x7f0000000140)="fd402a71d7fdf11d51092121a93123b3b1bcb3f9e7a595da5507fe1a9bc7bcf0dbc461f5e07cc37ec8d47bd5b16fdc0c35a2a2eb5c1550a71f25dc70f477039229d9bd431f59c064a36d6d2b35eef55e48c69b012ba61764ba96a228b55c91d0f99b77f94953f699fea6b2b9ba5cc2b9928aacc38968b7b90cf77e9b6e0f00cc742383dfe2e934d02b6e092b7c26220b533caba523676d5dfeb62f15694879a6003e4682027ff9afd9870944837f2081e37ce041d19dc6ad480f859e62854701bd6f1adc7ee71afbb9c3934145b7cea0d1a80f98d6a9d9a414c27304e4389af752bf440e1cd551", 0xe7, 0x6}, {&(0x7f0000000240)="dcd635316abc0566867b6c5792d38b26200e6b6a34721346d319fdad1b4a55e946d3e9c2e2f2af43ec5a2532a932d968740ebd119b17f750fc2830fc95f207fa9aa22ad2310e0730befd149622893587962bba882273254c7641f6ca11fb72383f496d585cd3523ec896b982a95e4aa8d279e4f14d3f92e6d1b41a2f74d66a5d31b71c80aa60f6c9cc", 0x89, 0xffffffffffff83d6}, {&(0x7f0000000300)="84c004ed630625e0", 0x8}, {&(0x7f0000000340)="3c5470379a80d0ef5678f7c24f12281bd91036cae247b09f0b1869d241fce03041bbc2759f1364635d0ac7d988ca881b632035e22f9a51f41c2183a8d13a69ef0dcbd40c00cdacf3f4772fe62fc049e2607a64ce6f914ba7d9b6e9b3", 0x5c, 0x81}, {&(0x7f00000003c0)="ecfe97ed14a0f5ee", 0x8, 0x80}, {&(0x7f0000000400)="47d646ab8d61f0c1d3a1c4f489be3441ce626fcb80afb9998c9c9a1eed90e96e5c633b", 0x23, 0x3}, {&(0x7f0000000440)="801d07db0ec19830845e6ba5063b343d794853b3a368fee1ffe6c0e61ff81027f9b97e8af75d6643ae9a38141f3c8997ca34d1435c199fdba353906d5b843598eb35e427c026bc184a0f9e264e0d7c7e768bddb94895ce2f1712c5138943202e65659a11ab0d88e296d4e6ab2ffee8a6a05c", 0x72, 0x2}, {&(0x7f00000004c0)="8c67ed2097d8c31d04b64e2e9dde52c7c174faa23a97582a8b0e", 0x1a, 0x9}], 0x1800, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d3078303030303030303030103030376666662c646f6e745f6d6561737572652c7375626a5f757365723d2d262e23832e2f5d2c666f776e65723e", @ANYRESDEC=r0, @ANYBLOB=',hash,obj_role=,.,smackfsfloor=+,\x00']) r1 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) r4 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) syz_io_uring_submit(r7, r6, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r2, r6, &(0x7f00000006c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000680)={0x0, 0x3938700}, 0x1, 0x1}, 0x8) syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) r10 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x2010, r1, 0x0) syz_io_uring_submit(r10, r9, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r2, r9, &(0x7f0000000700)=@IORING_OP_POLL_REMOVE={0x7, 0x3}, 0x7) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000740)={0x3, 'vlan1\x00', {0x3}, 0x2}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:18:06 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:18:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 36) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:18:06 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x100000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:18:06 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x19, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2746.087598] loop1: detected capacity change from 0 to 33559552 [ 2746.109392] loop3: detected capacity change from 0 to 8324608 [ 2746.188565] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2746.188565] program syz-executor.1 not setting count and/or reply_len properly [ 2746.198753] FAULT_INJECTION: forcing a failure. [ 2746.198753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2746.200774] CPU: 0 PID: 14536 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2746.201889] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2746.203208] Call Trace: [ 2746.203637] dump_stack+0x107/0x167 [ 2746.204220] should_fail.cold+0x5/0xa [ 2746.204847] copy_page_from_iter+0x40a/0x900 [ 2746.205553] blk_rq_map_user_iov+0x138b/0x1a60 [ 2746.206292] ? blk_rq_unmap_user+0x750/0x750 [ 2746.207005] ? find_held_lock+0x2c/0x110 [ 2746.207665] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2746.208526] ? lock_downgrade+0x6d0/0x6d0 [ 2746.209184] ? import_single_range+0x24d/0x2e0 [ 2746.209914] blk_rq_map_user+0x103/0x170 [ 2746.210563] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2746.211319] ? alloc_pages_current+0x18f/0x280 [ 2746.212050] ? sg_build_indirect.isra.0+0x448/0x710 [ 2746.212876] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2746.213732] ? sg_build_indirect.isra.0+0x710/0x710 [ 2746.214521] ? vprintk_func+0x93/0x140 [ 2746.215135] ? record_print_text.cold+0x16/0x16 [ 2746.215876] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2746.216678] ? trace_hardirqs_on+0x5b/0x180 [ 2746.217372] sg_write.part.0+0x69e/0xaa0 [ 2746.218013] ? sg_new_write.isra.0+0x770/0x770 [ 2746.218736] ? find_held_lock+0x2c/0x110 [ 2746.219379] ? __might_fault+0xd3/0x180 [ 2746.220005] ? lock_downgrade+0x6d0/0x6d0 [ 2746.220682] ? _cond_resched+0x10/0x30 [ 2746.221293] ? inode_security+0x107/0x140 [ 2746.221944] ? avc_policy_seqno+0x9/0x70 [ 2746.222584] ? selinux_file_permission+0x92/0x520 [ 2746.223347] sg_write+0x87/0x120 [ 2746.223887] do_iter_write+0x4f0/0x700 [ 2746.224504] ? import_iovec+0x83/0xb0 [ 2746.225129] vfs_writev+0x1ae/0x620 [ 2746.225708] ? vfs_iter_write+0xa0/0xa0 [ 2746.226345] ? __fget_files+0x2cf/0x520 [ 2746.226969] ? lock_downgrade+0x6d0/0x6d0 [ 2746.227622] ? find_held_lock+0x2c/0x110 [ 2746.228267] ? ksys_write+0x12d/0x260 20:18:06 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) stat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) setresuid(r1, r2, r3) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2746.228883] ? __fget_files+0x2f8/0x520 [ 2746.229708] ? __fget_light+0xea/0x290 [ 2746.230334] do_writev+0x139/0x300 [ 2746.230905] ? vfs_writev+0x620/0x620 [ 2746.231511] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2746.232339] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2746.233180] do_syscall_64+0x33/0x40 [ 2746.233772] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2746.234585] RIP: 0033:0x7f952207fb19 [ 2746.235190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2746.238145] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2746.239376] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2746.240530] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2746.241675] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2746.242831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2746.243977] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:18:06 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:18:06 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1a, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:18:06 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2746.367408] blktrace: Concurrent blktraces are not allowed on loop14 20:18:06 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x5, 0x0, 0x0, 0x0, &(0x7f0000ff3000/0x3000)=nil, 0x3000, 0x0, 0x0, {0x0, r1}}, 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, r1}}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:18:06 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x10000, &(0x7f0000001780)={'trans=unix,', {[{@loose}], [{@fowner_lt={'fowner<', r1}}, {@measure}]}}) 20:18:06 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:18:25 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1b, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:18:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x20100000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:18:25 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x200000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:18:25 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:18:25 executing program 3: exit(0x6) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) exit(0x200) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="dc058cd7203c090f2e00"], &(0x7f0000000180)=""/145, 0x91) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000000c0), 0xc}, 0x400}, 0x0, 0x4, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) exit(0x80000000) 20:18:25 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 37) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:18:25 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:18:25 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000800)='./file0\x00', 0x3, 0x2, &(0x7f0000000840)=[{&(0x7f0000001900)="02cac89afb9af37f18b4e7fc37b8b1d28e87e67c7a26714ca75cfa19a95c67c6d381ce9e5d9cf0cb2e670f838cc408e7a599c17d216f3fd43435e9a53c0b7a3e4afc59bfc39a7cc162a1f45e8feaa56f56beb396b2948e65595cd526bd08a24b7b1b8d1486c0a82ad5e093de0a6709236422ef19e6660e39f7972026f151261487a77b37282953ebe00b4b682e22b4f0c35a6b937806a6ac22d89199779a1186076f7badc7076cb60f2ecdd48a0ee33de2e6d269355822cbf7b6ad2ea8a8b9e0c6a544fb16c4a8bca0", 0xc9, 0x93}, {&(0x7f0000001e00)="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", 0x1000, 0xbf53637}], 0x4000, &(0x7f0000001a00)={[{@utf8no}], [{@hash}, {@permit_directio}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x8b, 0x9, 0x3, 0x1, 0x0, 0xffffffffffff0000, 0x2000, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000480)}, 0x800, 0x6, 0x769, 0x4, 0x80, 0x4bad639a, 0x3, 0x0, 0x9, 0x0, 0x5}, 0x0, 0xf, 0xffffffffffffffff, 0xb) syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_setup(0xdbd, &(0x7f00000003c0)={0x0, 0x59d8, 0x4, 0x3, 0x3cb}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff2000/0xe000)=nil, &(0x7f00000001c0), &(0x7f0000000340)=0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000440)=@IORING_OP_READ_FIXED={0x4, 0x1, 0x4004, @fd=r0, 0x7, 0x0, 0x20, 0x0, 0x0, {0x3}}, 0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2765.442755] loop2: detected capacity change from 0 to 130706432 [ 2765.468958] FAT-fs (loop2): Unrecognized mount option "hash" or missing value [ 2765.504773] loop1: detected capacity change from 0 to 33559552 [ 2765.507827] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2765.507827] program syz-executor.1 not setting count and/or reply_len properly [ 2765.518041] FAULT_INJECTION: forcing a failure. [ 2765.518041] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2765.518961] blktrace: Concurrent blktraces are not allowed on loop14 [ 2765.520712] CPU: 1 PID: 14594 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2765.520732] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2765.526089] Call Trace: [ 2765.526828] dump_stack+0x107/0x167 [ 2765.527799] should_fail.cold+0x5/0xa [ 2765.528830] copy_page_from_iter+0x40a/0x900 [ 2765.529998] blk_rq_map_user_iov+0x138b/0x1a60 [ 2765.531288] ? blk_rq_unmap_user+0x750/0x750 [ 2765.532468] ? find_held_lock+0x2c/0x110 [ 2765.533609] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2765.535071] ? lock_downgrade+0x6d0/0x6d0 [ 2765.536072] ? import_single_range+0x24d/0x2e0 [ 2765.537125] blk_rq_map_user+0x103/0x170 [ 2765.538107] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2765.539392] ? alloc_pages_current+0x18f/0x280 [ 2765.540567] ? sg_build_indirect.isra.0+0x448/0x710 [ 2765.541706] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2765.542906] ? sg_build_indirect.isra.0+0x710/0x710 [ 2765.544200] ? vprintk_func+0x93/0x140 [ 2765.545290] ? record_print_text.cold+0x16/0x16 [ 2765.546526] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2765.547929] ? trace_hardirqs_on+0x5b/0x180 [ 2765.549166] sg_write.part.0+0x69e/0xaa0 [ 2765.550296] ? sg_new_write.isra.0+0x770/0x770 [ 2765.551574] ? find_held_lock+0x2c/0x110 [ 2765.552689] ? __might_fault+0xd3/0x180 [ 2765.553643] ? lock_downgrade+0x6d0/0x6d0 [ 2765.554623] ? _cond_resched+0x10/0x30 [ 2765.555539] ? inode_security+0x107/0x140 [ 2765.556536] ? avc_policy_seqno+0x9/0x70 [ 2765.557524] ? selinux_file_permission+0x92/0x520 [ 2765.558709] sg_write+0x87/0x120 [ 2765.559521] do_iter_write+0x4f0/0x700 [ 2765.560449] ? import_iovec+0x83/0xb0 [ 2765.561398] vfs_writev+0x1ae/0x620 [ 2765.562269] ? vfs_iter_write+0xa0/0xa0 [ 2765.563218] ? __fget_files+0x2cf/0x520 [ 2765.564140] ? lock_downgrade+0x6d0/0x6d0 [ 2765.565071] ? find_held_lock+0x2c/0x110 [ 2765.565968] ? ksys_write+0x12d/0x260 [ 2765.566809] ? __fget_files+0x2f8/0x520 [ 2765.567694] ? __fget_light+0xea/0x290 [ 2765.568559] do_writev+0x139/0x300 [ 2765.569353] ? vfs_writev+0x620/0x620 [ 2765.570195] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2765.571506] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2765.572715] do_syscall_64+0x33/0x40 [ 2765.573671] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2765.574897] RIP: 0033:0x7f952207fb19 [ 2765.575795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2765.579969] RSP: 002b:00007f951f5b3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2765.581764] RAX: ffffffffffffffda RBX: 00007f95221930e0 RCX: 00007f952207fb19 [ 2765.583445] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000009 [ 2765.585537] RBP: 00007f951f5b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2765.587409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2765.589310] R13: 00007ffd2a29b96f R14: 00007f951f5b3300 R15: 0000000000022000 20:18:26 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1c, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:18:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:18:26 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 38) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2765.866595] loop1: detected capacity change from 0 to 33559552 20:18:26 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2765.882624] blktrace: Concurrent blktraces are not allowed on loop14 20:18:26 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0x6e, &(0x7f0000000540)=[{&(0x7f0000000440)=""/84, 0x54}, {&(0x7f00000001c0)=""/36, 0x24}, {&(0x7f0000000340)=""/19, 0x13}], 0x3, &(0x7f0000001900)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb8}, 0x100) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2766.052040] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2766.052040] program syz-executor.1 not setting count and/or reply_len properly [ 2766.055507] FAULT_INJECTION: forcing a failure. [ 2766.055507] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2766.057593] CPU: 0 PID: 14618 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2766.058800] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2766.060250] Call Trace: [ 2766.060706] dump_stack+0x107/0x167 [ 2766.061358] should_fail.cold+0x5/0xa [ 2766.062027] copy_page_from_iter+0x40a/0x900 [ 2766.062804] blk_rq_map_user_iov+0x138b/0x1a60 [ 2766.063611] ? blk_rq_unmap_user+0x750/0x750 [ 2766.064378] ? find_held_lock+0x2c/0x110 [ 2766.065098] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2766.066025] ? lock_downgrade+0x6d0/0x6d0 [ 2766.066743] ? import_single_range+0x24d/0x2e0 [ 2766.067543] blk_rq_map_user+0x103/0x170 [ 2766.068251] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2766.069083] ? alloc_pages_current+0x18f/0x280 [ 2766.069887] ? sg_build_indirect.isra.0+0x448/0x710 [ 2766.070771] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2766.071690] ? sg_build_indirect.isra.0+0x710/0x710 [ 2766.072557] ? vprintk_func+0x93/0x140 [ 2766.073250] ? record_print_text.cold+0x16/0x16 [ 2766.074048] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2766.074914] ? trace_hardirqs_on+0x5b/0x180 [ 2766.075652] sg_write.part.0+0x69e/0xaa0 [ 2766.076349] ? sg_new_write.isra.0+0x770/0x770 [ 2766.077136] ? find_held_lock+0x2c/0x110 [ 2766.077834] ? __might_fault+0xd3/0x180 [ 2766.078518] ? lock_downgrade+0x6d0/0x6d0 [ 2766.079236] ? _cond_resched+0x10/0x30 [ 2766.079897] ? inode_security+0x107/0x140 [ 2766.080602] ? avc_policy_seqno+0x9/0x70 [ 2766.081300] ? selinux_file_permission+0x92/0x520 [ 2766.082125] sg_write+0x87/0x120 [ 2766.082738] do_iter_write+0x4f0/0x700 [ 2766.083402] ? import_iovec+0x83/0xb0 [ 2766.084050] vfs_writev+0x1ae/0x620 [ 2766.084669] ? vfs_iter_write+0xa0/0xa0 [ 2766.085358] ? __fget_files+0x2cf/0x520 [ 2766.086034] ? lock_downgrade+0x6d0/0x6d0 [ 2766.086736] ? find_held_lock+0x2c/0x110 [ 2766.087427] ? ksys_write+0x12d/0x260 [ 2766.088075] ? __fget_files+0x2f8/0x520 [ 2766.088759] ? __fget_light+0xea/0x290 [ 2766.089426] do_writev+0x139/0x300 [ 2766.090021] ? vfs_writev+0x620/0x620 [ 2766.090665] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2766.091540] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2766.092401] do_syscall_64+0x33/0x40 [ 2766.093030] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2766.093891] RIP: 0033:0x7f952207fb19 [ 2766.094510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2766.097483] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2766.098748] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2766.099881] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2766.101055] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2766.102231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2766.103362] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:18:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:18:26 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x400300, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:18:26 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1d, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:18:26 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 39) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2766.336349] blktrace: Concurrent blktraces are not allowed on loop14 20:18:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2e000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:18:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {0x0, 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:18:26 executing program 3: init_module(&(0x7f0000000340)='[\x00', 0x2, &(0x7f0000000380)='security.capability\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000), &(0x7f0000000040)=@v2={0x2000000, [{0x3, 0x18}, {0x83e, 0x591}]}, 0x14, 0x3) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0xdbe8}}, './file0\x00'}) openat(r2, &(0x7f00000003c0)='./file0\x00', 0x2000, 0x112) accept$unix(r2, &(0x7f0000000280)=@abs, &(0x7f0000000300)=0x6e) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) [ 2766.389846] loop1: detected capacity change from 0 to 33559552 [ 2766.459008] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2766.459008] program syz-executor.1 not setting count and/or reply_len properly [ 2766.461749] FAULT_INJECTION: forcing a failure. [ 2766.461749] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2766.463466] CPU: 0 PID: 14655 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2766.464533] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2766.465727] Call Trace: [ 2766.466122] dump_stack+0x107/0x167 [ 2766.466658] should_fail.cold+0x5/0xa [ 2766.467242] copy_page_from_iter+0x40a/0x900 [ 2766.467912] blk_rq_map_user_iov+0x138b/0x1a60 [ 2766.468560] ? blk_rq_unmap_user+0x750/0x750 [ 2766.469179] ? find_held_lock+0x2c/0x110 [ 2766.469702] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2766.470370] ? lock_downgrade+0x6d0/0x6d0 [ 2766.470909] ? import_single_range+0x24d/0x2e0 [ 2766.471512] blk_rq_map_user+0x103/0x170 [ 2766.472050] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2766.472672] ? alloc_pages_current+0x18f/0x280 [ 2766.473293] ? sg_build_indirect.isra.0+0x448/0x710 [ 2766.473945] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2766.474637] ? sg_build_indirect.isra.0+0x710/0x710 [ 2766.475287] ? vprintk_func+0x93/0x140 [ 2766.475791] ? record_print_text.cold+0x16/0x16 [ 2766.476400] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2766.477066] ? trace_hardirqs_on+0x5b/0x180 [ 2766.477643] sg_write.part.0+0x69e/0xaa0 [ 2766.478184] ? sg_new_write.isra.0+0x770/0x770 [ 2766.478775] ? find_held_lock+0x2c/0x110 [ 2766.479310] ? __might_fault+0xd3/0x180 [ 2766.479819] ? lock_downgrade+0x6d0/0x6d0 [ 2766.480342] ? _cond_resched+0x10/0x30 [ 2766.480841] ? inode_security+0x107/0x140 [ 2766.481342] ? avc_policy_seqno+0x9/0x70 [ 2766.481843] ? selinux_file_permission+0x92/0x520 [ 2766.482460] sg_write+0x87/0x120 [ 2766.482884] do_iter_write+0x4f0/0x700 [ 2766.483351] ? import_iovec+0x83/0xb0 [ 2766.483825] vfs_writev+0x1ae/0x620 [ 2766.484287] ? vfs_iter_write+0xa0/0xa0 [ 2766.484794] ? __fget_files+0x2cf/0x520 [ 2766.485299] ? lock_downgrade+0x6d0/0x6d0 [ 2766.485780] ? find_held_lock+0x2c/0x110 [ 2766.486302] ? ksys_write+0x12d/0x260 [ 2766.486748] ? __fget_files+0x2f8/0x520 [ 2766.487322] ? __fget_light+0xea/0x290 [ 2766.487882] do_writev+0x139/0x300 [ 2766.488386] ? vfs_writev+0x620/0x620 [ 2766.488937] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2766.489669] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2766.490320] do_syscall_64+0x33/0x40 [ 2766.490758] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2766.491368] RIP: 0033:0x7f952207fb19 [ 2766.491803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2766.493969] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2766.494863] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2766.495701] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2766.496540] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2766.497390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2766.498225] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:18:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {0x0, 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:18:43 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:18:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3f000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:18:43 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x1000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:18:43 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1e, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:18:43 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) [ 2782.844597] loop1: detected capacity change from 0 to 33559552 [ 2782.849836] blktrace: Concurrent blktraces are not allowed on loop14 syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x1, 0x6, &(0x7f0000001b00)=[{&(0x7f0000001e00)="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", 0x1000, 0x34}, {&(0x7f00000003c0)="ce957770e469062d595616ce06f7543115f295eaa5a23b1c4ed00c1902b554b55c0aeba68b735c2e41b7579553b2a42d949c276ce0a7c2c450202c558dbcb78d3b", 0x41, 0xff}, {&(0x7f0000000440)="5ff1b2ce", 0x4, 0x826}, {&(0x7f0000001900)="b0359b7bda41382ca6d666c58d1209e8b92242a0f1708ce757f134a112bce42fa5d701064b686b10a1d9588e52518d8524825cedeec3c92f0bed3249d7302509d04fa829e20b827b491a9fa9f7acd79a52d4109f12d169e6f1b01bf09aa2ec7fc668604b85cf1d680daf1588236e3d462cd0c231fe303426dc025fa82d849fcce1e65716a01187c25db6a92cb3f9f748a80a9b830c3a0d5cd617d73ee35cadbab3ea60b380ef46bdb9fc03a69ac850356dbd4ec75666f2e97625fceeb1bf317cc449a0fc4326a83225fb1d48d974b5b9c5", 0xd1, 0x7}, {&(0x7f0000000540)="732549c430de25506e9cea332bffdcb0b282b5b222884703be1f17bdfb0ed7764206480e346e5a1b9890477c89b5a4ddaa12d9a8cda67bb4a588c48304b682bd34f7eab72f557513b8bd3d37b1852497d49caff8f377bac5199888ae350c7c9f7c890a3b4702e02286c6f5c01a4b0bc07385568d4db0bcf6e2d8", 0x7a, 0x7ff}, {&(0x7f0000001a00)="b8d614499345b149ad2ebabde6b62ea6adcd9aeaefa90e3e80359e72b4ca393c0fabdcaf0e15d5d3426add721c2e77894fabb3cff29e88db5a8035f1a912a763f060238ace1afbcc0c8eb1ccca71b3854e91fd8382ad6f99e64a9df4d585542f271cff3a6f885dd7965a2ff57678690962301250b581aa2a29bd337bad718dd5c3f1a932b9a5f9be1d4f895df425ee721051983723b8ffc90d8189b7a28e1c6fc07aaf60299749c50642cd4fa50cb9762c773a9cb471af5f4e73dee7bad040fc7f4b08c3ca85b2a2c638596cdec7209d762a8c83b6cb0f5390e9", 0xda, 0x7}], 0x1000020, &(0x7f0000001bc0)={[{@uni_xlateno}, {@fat=@dos1xfloppy}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_winnt}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfsroot}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', r0}}, {@subj_user}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x8c00, 0x50) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:18:43 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 40) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:18:43 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) r4 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) syz_io_uring_submit(r7, r6, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r2, r6, &(0x7f0000000040)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)={0x80000000}, r1, 0x3, 0x0, 0x1}, 0x3) [ 2782.989532] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2782.989532] program syz-executor.1 not setting count and/or reply_len properly [ 2782.997772] FAULT_INJECTION: forcing a failure. [ 2782.997772] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2783.000077] CPU: 1 PID: 14675 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2783.001370] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2783.002806] Call Trace: [ 2783.003254] dump_stack+0x107/0x167 [ 2783.003924] should_fail.cold+0x5/0xa [ 2783.004684] copy_page_from_iter+0x40a/0x900 [ 2783.005538] blk_rq_map_user_iov+0x138b/0x1a60 [ 2783.006482] ? blk_rq_unmap_user+0x750/0x750 [ 2783.007391] ? find_held_lock+0x2c/0x110 [ 2783.008218] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2783.009312] ? lock_downgrade+0x6d0/0x6d0 [ 2783.010151] ? import_single_range+0x24d/0x2e0 [ 2783.011092] blk_rq_map_user+0x103/0x170 [ 2783.011933] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2783.012910] ? alloc_pages_current+0x18f/0x280 [ 2783.013855] ? sg_build_indirect.isra.0+0x448/0x710 [ 2783.014879] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2783.015938] ? sg_build_indirect.isra.0+0x710/0x710 [ 2783.016948] ? vprintk_func+0x93/0x140 [ 2783.017747] ? record_print_text.cold+0x16/0x16 [ 2783.018705] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2783.019707] ? trace_hardirqs_on+0x5b/0x180 [ 2783.020633] sg_write.part.0+0x69e/0xaa0 [ 2783.021495] ? sg_new_write.isra.0+0x770/0x770 [ 2783.022449] ? find_held_lock+0x2c/0x110 [ 2783.023289] ? __might_fault+0xd3/0x180 [ 2783.024113] ? lock_downgrade+0x6d0/0x6d0 [ 2783.024979] ? _cond_resched+0x10/0x30 [ 2783.025792] ? inode_security+0x107/0x140 [ 2783.026649] ? avc_policy_seqno+0x9/0x70 [ 2783.027483] ? selinux_file_permission+0x92/0x520 [ 2783.028484] sg_write+0x87/0x120 [ 2783.029201] do_iter_write+0x4f0/0x700 [ 2783.030008] ? import_iovec+0x83/0xb0 [ 2783.030797] vfs_writev+0x1ae/0x620 [ 2783.031554] ? vfs_iter_write+0xa0/0xa0 [ 2783.032375] ? __fget_files+0x2cf/0x520 [ 2783.033304] ? lock_downgrade+0x6d0/0x6d0 [ 2783.034233] ? find_held_lock+0x2c/0x110 [ 2783.035144] ? ksys_write+0x12d/0x260 [ 2783.035994] ? __fget_files+0x2f8/0x520 [ 2783.036896] ? __fget_light+0xea/0x290 [ 2783.037780] do_writev+0x139/0x300 [ 2783.038576] ? vfs_writev+0x620/0x620 [ 2783.039441] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2783.040610] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2783.041787] do_syscall_64+0x33/0x40 [ 2783.042614] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2783.043754] RIP: 0033:0x7f952207fb19 [ 2783.044590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2783.048693] RSP: 002b:00007f951f5f5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2783.050392] RAX: ffffffffffffffda RBX: 00007f9522192f60 RCX: 00007f952207fb19 [ 2783.051977] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 000000000000000a [ 2783.053566] RBP: 00007f951f5f51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2783.055142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2783.056729] R13: 00007ffd2a29b96f R14: 00007f951f5f5300 R15: 0000000000022000 20:19:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x40000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:19:00 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x2000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:19:00 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x102, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:19:00 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(&(0x7f0000000340)=@nullb, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='coda\x00', 0xa0008e, &(0x7f0000000440)='proc\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00') openat(r1, &(0x7f00000001c0)='./file0\x00', 0x200000, 0x100) 20:19:00 executing program 3: stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x0, 0x41d5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) setresuid(r4, r5, r0) renameat(r2, &(0x7f0000000000)='./file0\x00', r3, &(0x7f0000000040)='./file0\x00') r6 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r6, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0xb1bd5793028ce9dd}, [{0x2, 0x6, r0}], {0x4, 0x4}, [{0x8, 0x2, r7}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x1, r1}], {0x10, 0x1}, {0x20, 0x1}}, 0x44, 0x1) io_uring_enter(r6, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000100)={0x94e6, 0x0, &(0x7f0000000000)=[0xffffffffffffffff]}, 0x1) 20:19:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {0x0, 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:00 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:00 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 41) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2800.284570] loop1: detected capacity change from 0 to 33559552 [ 2800.398828] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2800.398828] program syz-executor.1 not setting count and/or reply_len properly [ 2800.415272] FAULT_INJECTION: forcing a failure. [ 2800.415272] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2800.418033] CPU: 1 PID: 14725 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2800.419547] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2800.421472] Call Trace: [ 2800.422072] dump_stack+0x107/0x167 [ 2800.422879] should_fail.cold+0x5/0xa [ 2800.423734] copy_page_from_iter+0x40a/0x900 [ 2800.424769] blk_rq_map_user_iov+0x138b/0x1a60 [ 2800.425881] ? blk_rq_unmap_user+0x750/0x750 [ 2800.426907] ? find_held_lock+0x2c/0x110 [ 2800.427820] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2800.428986] ? lock_downgrade+0x6d0/0x6d0 [ 2800.429908] ? import_single_range+0x24d/0x2e0 [ 2800.430930] blk_rq_map_user+0x103/0x170 [ 2800.431844] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2800.432905] ? alloc_pages_current+0x18f/0x280 [ 2800.433928] ? sg_build_indirect.isra.0+0x448/0x710 [ 2800.435040] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2800.436199] ? sg_build_indirect.isra.0+0x710/0x710 [ 2800.437315] ? vprintk_func+0x93/0x140 [ 2800.438169] ? record_print_text.cold+0x16/0x16 [ 2800.439199] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2800.440317] ? trace_hardirqs_on+0x5b/0x180 [ 2800.441287] sg_write.part.0+0x69e/0xaa0 [ 2800.442185] ? sg_new_write.isra.0+0x770/0x770 [ 2800.443204] ? find_held_lock+0x2c/0x110 [ 2800.444118] ? __might_fault+0xd3/0x180 [ 2800.444996] ? lock_downgrade+0x6d0/0x6d0 [ 2800.445937] ? _cond_resched+0x10/0x30 [ 2800.446794] ? inode_security+0x107/0x140 [ 2800.447726] ? avc_policy_seqno+0x9/0x70 [ 2800.448623] ? selinux_file_permission+0x92/0x520 [ 2800.449709] sg_write+0x87/0x120 [ 2800.450453] do_iter_write+0x4f0/0x700 [ 2800.451313] ? import_iovec+0x83/0xb0 [ 2800.452154] vfs_writev+0x1ae/0x620 [ 2800.452962] ? vfs_iter_write+0xa0/0xa0 [ 2800.453844] ? __fget_files+0x2cf/0x520 [ 2800.454716] ? lock_downgrade+0x6d0/0x6d0 [ 2800.455628] ? find_held_lock+0x2c/0x110 [ 2800.456524] ? ksys_write+0x12d/0x260 [ 2800.457402] ? __fget_files+0x2f8/0x520 [ 2800.458293] ? __fget_light+0xea/0x290 [ 2800.459143] do_writev+0x139/0x300 [ 2800.459934] ? vfs_writev+0x620/0x620 [ 2800.460787] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2800.461960] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2800.463097] do_syscall_64+0x33/0x40 [ 2800.463919] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2800.465063] RIP: 0033:0x7f952207fb19 [ 2800.465895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2800.470152] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2800.471998] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2800.473614] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2800.475119] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2800.476629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2800.478243] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:19:01 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:19:01 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:01 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x106, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:19:01 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 42) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2800.828987] blktrace: Concurrent blktraces are not allowed on loop14 20:19:01 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = mq_open(&(0x7f00000000c0)='\x00', 0x80, 0x138, &(0x7f0000000100)={0x7f, 0x6, 0x3, 0x9}) copy_file_range(r2, &(0x7f0000000140)=0x7, r1, &(0x7f0000000180)=0x8, 0xffffffff, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x100) r3 = gettid() r4 = gettid() kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9, 0x4, 0x8, 0x3, 0x0, 0x0, 0x830, 0xb, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f00000001c0), 0x3}, 0x10740, 0x1000, 0xcd69, 0x9, 0x1, 0x0, 0x9, 0x0, 0xffff, 0x0, 0x48d9}, r4, 0x1, r1, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r5, &(0x7f0000000000)='./file0\x00', r6, &(0x7f0000000040)='./file0\x00') ioctl$DVD_WRITE_STRUCT(r5, 0x5390, &(0x7f0000000280)=@physical={0x0, 0x3, [{0x4, 0x9, 0x2, 0x6, 0x7, 0x1, 0x0, 0xc, 0x1, 0x0, 0x5, 0x10001, 0x9}, {0xb, 0x4, 0x5, 0x8, 0x8, 0x1, 0x1, 0x5, 0x0, 0x1, 0x4, 0x8, 0x3}, {0x8, 0x9, 0x9, 0x1, 0xd, 0x0, 0x0, 0x4, 0x4, 0x1, 0x5, 0x6, 0xffff}, {0x2, 0xc, 0xa, 0xb, 0x0, 0x0, 0x1, 0xa, 0x3, 0x1, 0x6, 0x6836, 0x8000}]}) [ 2800.974649] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2800.974649] program syz-executor.1 not setting count and/or reply_len properly 20:19:01 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2801.012931] FAULT_INJECTION: forcing a failure. [ 2801.012931] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2801.015516] CPU: 0 PID: 14762 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2801.016974] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2801.018717] Call Trace: [ 2801.019279] dump_stack+0x107/0x167 [ 2801.020046] should_fail.cold+0x5/0xa [ 2801.020852] copy_page_from_iter+0x40a/0x900 [ 2801.021793] blk_rq_map_user_iov+0x138b/0x1a60 [ 2801.022771] ? blk_rq_unmap_user+0x750/0x750 [ 2801.023708] ? find_held_lock+0x2c/0x110 [ 2801.024573] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2801.025701] ? lock_downgrade+0x6d0/0x6d0 [ 2801.026573] ? import_single_range+0x24d/0x2e0 [ 2801.027534] blk_rq_map_user+0x103/0x170 [ 2801.028392] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2801.029402] ? alloc_pages_current+0x18f/0x280 [ 2801.030419] ? sg_build_indirect.isra.0+0x448/0x710 [ 2801.031684] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2801.033012] ? sg_build_indirect.isra.0+0x710/0x710 [ 2801.034273] ? vprintk_func+0x93/0x140 [ 2801.035258] ? record_print_text.cold+0x16/0x16 [ 2801.036435] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2801.037713] ? trace_hardirqs_on+0x5b/0x180 [ 2801.038811] sg_write.part.0+0x69e/0xaa0 [ 2801.039838] ? sg_new_write.isra.0+0x770/0x770 [ 2801.040994] ? find_held_lock+0x2c/0x110 [ 2801.042014] ? __might_fault+0xd3/0x180 [ 2801.043013] ? lock_downgrade+0x6d0/0x6d0 [ 2801.044078] ? _cond_resched+0x10/0x30 [ 2801.045054] ? inode_security+0x107/0x140 [ 2801.046108] ? avc_policy_seqno+0x9/0x70 [ 2801.047131] ? selinux_file_permission+0x92/0x520 [ 2801.048359] sg_write+0x87/0x120 [ 2801.049215] do_iter_write+0x4f0/0x700 [ 2801.050214] ? import_iovec+0x83/0xb0 [ 2801.051179] vfs_writev+0x1ae/0x620 [ 2801.052097] ? vfs_iter_write+0xa0/0xa0 [ 2801.053099] ? __fget_files+0x2cf/0x520 [ 2801.054110] ? lock_downgrade+0x6d0/0x6d0 [ 2801.055157] ? find_held_lock+0x2c/0x110 [ 2801.056188] ? ksys_write+0x12d/0x260 [ 2801.057149] ? __fget_files+0x2f8/0x520 [ 2801.058370] ? __fget_light+0xea/0x290 [ 2801.059499] do_writev+0x139/0x300 [ 2801.060561] ? vfs_writev+0x620/0x620 [ 2801.061652] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2801.063128] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2801.064634] do_syscall_64+0x33/0x40 [ 2801.065714] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2801.067047] RIP: 0033:0x7f952207fb19 [ 2801.068069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2801.072737] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2801.074665] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2801.076468] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000007 [ 2801.078276] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2801.080067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2801.081870] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:19:01 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x3000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:19:01 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) getdents64(0xffffffffffffff9c, &(0x7f00000003c0)=""/116, 0x74) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x48000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:19:01 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:01 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10a, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:19:01 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2f667f762f6e626432009a801ee0"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='gfs2\x00', 0x2028082, &(0x7f00000000c0)='(\x00') setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4221, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0x104e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, &(0x7f0000000000), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x11, 0x32, 0x5e0f, 'ip6_vti0\x00', 'veth0_to_batadv\x00', 'bridge_slave_1\x00', 'caif0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3f}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @multicast, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], 0xe6, 0x146, 0x18e, [@realm={{'realm\x00', 0x0, 0x10}, {{0x0, 0x1f}}}, @statistic={{'statistic\x00', 0x0, 0x18}, {{0x1, 0x1, 0x4, 0x7fffffff, 0xff, {0x2}}}}], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x6}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x71, 0x1, {0x9}}}}}, {0x3, 0x6, 0x88ca, 'caif0\x00', 'team_slave_1\x00', 'ipvlan1\x00', 'veth1_to_bond\x00', @multicast, [0xff], @remote, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], 0x896, 0x95e, 0x98e, [@u32={{'u32\x00', 0x0, 0x7c0}, {{[{[{0xffff6191, 0x2}, {0xd290, 0x1}, {0x401}, {0x1000}, {0x2, 0x2}, {0xbc7}, {0x55c}, {0x200, 0x2}, {0x5}, {0x8, 0x3}, {0x0, 0x3}], [{0xc11, 0x3}, {0x5, 0x7fffffff}, {0x7, 0x2}, {0x0, 0x6}, {0x401, 0x3}, {0x8, 0x80}, {0xe0d, 0x81}, {0xffffffff, 0x6}, {0x4, 0x3ff}, {0x2, 0x8}, {0x3ff, 0x3ff}], 0x0, 0x9}, {[{0x0, 0x3}, {}, {0x2, 0x1}, {0x9, 0x1}, {0x3, 0x1}, {0x400, 0x2}, {0x2, 0x3}, {0x8001, 0x1}, {0xffffffff}, {0x5, 0x3}, {0x1, 0x2}], [{0xc000000, 0x1}, {0x94b, 0x9}, {0xffff, 0x2}, {0x6, 0xb51}, {0x78, 0x45}, {0x567, 0x5}, {0xf80, 0x6}, {0x6, 0x6}, {0x8, 0x3f}, {0x0, 0x5}, {0x40, 0x1}], 0x6, 0xa}, {[{0x5, 0x2}, {0x8, 0x3}, {0x80000000}, {0x7, 0x2}, {0x1, 0x2}, {0x5c65, 0x3}, {0xc000000, 0x3}, {0x100, 0x2}, {0x2, 0x3}, {0x4, 0x1}, {0x8}], [{0x5, 0x80000000}, {0x4a3, 0xffffffff}, {0xa72d, 0x6}, {0x0, 0x80000000}, {0x7ff, 0x1000}, {0x9, 0x400}, {0x8000, 0x4}, {0xffff, 0x4}, {0x4}, {0x800, 0x4}, {0xe574, 0x7}], 0xb, 0x2}, {[{0x5}, {0x6, 0x2}, {0x100, 0x3}, {0x1000}, {0x7, 0x3}, {0x9, 0x2}, {0x2, 0x3}, {0x11, 0x2}, {0x27a, 0x3}, {0x6, 0x1}, {0x10000}], [{0x2, 0x9}, {0x3, 0x5}, {0x7, 0x2}, {0x7fffffff, 0x3f}, {0x1, 0xc4}, {0x3, 0x8}, {0x1000, 0x6}, {0x54861a16, 0x6}, {0xffffffff, 0xfffffff8}, {0x7, 0xa209}, {0x6ff7, 0x8001}], 0x7, 0x2}, {[{0xffff8000, 0x2}, {0x3, 0x3}, {0x3f, 0x3}, {0x2, 0x3}, {0x2bc}, {0x9, 0x1}, {0x7}, {0x2}, {0x91, 0x3}, {0x1}, {0x5, 0x2}], [{0x1, 0x4}, {0x46f}, {0x9, 0x3f}, {0x7, 0x2}, {0x8, 0x9}, {0x1000, 0x1}, {0x7fff, 0x2}, {0x7, 0x3ff}, {0x20, 0x8}, {0x5, 0x9}, {0x8000, 0xffff}], 0x8, 0x1}, {[{0xffff, 0x1}, {0x2dbf}, {0x7}, {0x7, 0x2}, {0xffffd113, 0x3}, {0x23, 0x1}, {0x80000001}, {0x9}, {0x2, 0x1}, {0xfffffff9, 0x1}, {0x5d45}], [{0x7fff, 0x3}, {0x100, 0x800}, {0xfff, 0x1}, {0x0, 0x8}, {0x0, 0x3}, {0x8, 0x2}, {0x9}, {0x3, 0x4}, {0x7ff, 0xffff1bfa}, {0xffffffff, 0x100}, {0x8, 0x39}], 0x0, 0x2}, {[{0xfffffe00, 0x3}, {0x5, 0x1}, {0x8}, {0x6f7}, {0x513a, 0x3}, {0x80000000, 0x3}, {0x1}, {0x100, 0x2}, {0x7f}, {0x6cc0}, {0x5, 0x2}], [{0xff, 0xba}, {0x6, 0x8}, {0xb1e9, 0x8}, {0x4, 0x4}, {0x40, 0x100}, {0x9}, {0x1, 0xffffffff}, {0xbef, 0xd6be}, {0x6, 0x7f}, {0x7, 0x80000001}, {0x8, 0x88}], 0x3, 0xb}, {[{0x1, 0x2}, {0x1, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x7, 0x3}, {0xfff, 0x2}, {0x0, 0x3}, {0x401}, {0x81, 0x3}, {0x1, 0x3}], [{0x401, 0x8}, {0x9a, 0xfffffffc}, {0x9, 0x69}, {0x0, 0x8}, {0x7fffffff, 0x5}, {0x11b4933, 0x2}, {0xffffff6d, 0x5}, {0x8, 0xe34}, {0x9, 0x7ff}, {0x7fffffff, 0x10001}, {0x4, 0xffff}], 0x9, 0x8}, {[{0x7fff, 0x2}, {0x2, 0x1}, {0x8, 0x2}, {0x6087ad4c, 0x3}, {0xfff, 0x2}, {0xffff, 0x2}, {0x2656783a, 0x3}, {0x4}, {0x1000, 0x3}, {0x81}, {0x3e, 0x1}], [{0x6, 0x98cb}, {0x8, 0x4}, {0xb4, 0x2ff69865}, {0xf745, 0x9}, {0x7, 0x40}, {0x5, 0x3cd5}, {0x3, 0x2}, {0x7f, 0x20000000}, {0x0, 0x80000000}, {0xdd1c, 0x1}, {0x40, 0x2}], 0x2}, {[{0x4, 0x1}, {0x1, 0x1}, {0x5e, 0x2}, {0x1, 0x3}, {0x400, 0x2}, {0x80000}, {0x200}, {0x1, 0x5}, {0xfff, 0x3}, {0x4, 0x2}, {0x6}], [{0x802, 0x200}, {0x8, 0x7}, {0x200}, {0x5, 0x3f}, {0x9, 0xa8}, {0x2, 0x3ff}, {0x0, 0x280}, {0x6, 0xfffffff9}, {0x10000, 0xffff}, {0x4, 0x4}, {0x1f, 0x72000000}], 0xb, 0x6}, {[{0xfffffffd}, {0x3ff, 0x2}, {0xd3fc, 0x2}, {0x0, 0x2}, {0x6, 0x2}, {0x8000}, {0x9}, {0x8, 0x1}, {0x0, 0x1}, {0x8, 0x2}, {0x10001}], [{0x6, 0x5}, {0x2, 0x6}, {0x7, 0x6}, {0x100, 0x80000001}, {0xffffffff, 0x7}, {0x5, 0x3aaf}, {0xdba7, 0x4}, {0xffffffff, 0x40}, {0x10000, 0x1}, {0x90b}, {0x8001, 0x4}], 0xa, 0xa}], 0x7}}}, @mark_m={{'mark_m\x00', 0x0, 0x18}, {{0x8000, 0x9, 0x0, 0x7}}}], [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x80000000, 'syz1\x00', {0x10001}}}}, @common=@nflog={'nflog\x00', 0x50, {{0x6, 0x9d3, 0x1, 0x0, 0x0, "df034cd4bf73836e7e56b5b68af9740059adaa0d12236129ed583410286f4a2a673d207b085c72b6d4501b4a179aa94dfba8e27aac25b5d53947d818c5550a80"}}}], @common=@STANDARD={'\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x11, 0x10, 0x22eb, 'vlan1\x00', 'geneve1\x00', 'nr0\x00', 'team_slave_1\x00', @broadcast, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @random="916f3076bdbd", [0x0, 0x0, 0x0, 0xff, 0xff], 0xce, 0xce, 0xfe, [@pkttype={{'pkttype\x00', 0x0, 0x8}, {{0x20}}}, @pkttype={{'pkttype\x00', 0x0, 0x8}, {{0x6, 0x1}}}], [], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x2, [{0x3, 0x1, 0x9b05, 'netdevsim0\x00', 'bridge0\x00', 'geneve1\x00', 'veth0_to_hsr\x00', @multicast, [0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff], 0xfe, 0x1a6, 0x1de, [@mark_m={{'mark_m\x00', 0x0, 0x18}, {{0x2, 0x3, 0x1, 0x1}}}, @nfacct={{'nfacct\x00', 0x0, 0x28}, {{'syz1\x00', 0x7}}}], [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x5, 0xfff, 0xde4f, 0x0, 0x0, "65ed16dca09bb92e5eb9a06d8439535ba77dfb6db9154f8116f526a1d3e048a0075ee6cc7e856f2ecddb4250d1b0a79ae8c6333d6e4c8a656d304097637b4deb"}}}], @common=@mark={'mark\x00', 0x10, {{0xffffffc0, 0xfffffffffffffffd}}}}, {0x9, 0x22, 0x5, 'bridge0\x00', 'wlan1\x00', 'rose0\x00', 'macsec0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0x116, 0x14e, 0x1c6, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x3, 0x7, 0x6003, 0x4, 0x2}}}, @ip6={{'ip6\x00', 0x0, 0x50}, {{@ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, [0xff000000, 0xff, 0xff, 0xff000000], [0xffffffff, 0xffffffff, 0xff, 0xffffff00], 0x7, 0x84, 0x14, 0x40, 0x4e23, 0x4e20, 0x4e22, 0x4e24}}}], [@common=@dnat={'dnat\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xd736, 0x9, 0x7cc, 0x0, 0x0, "149620d4b76d085e241fdce7f5eb7e6271a0d860c6c481865212f1c128964d7599f97a78f213436fcdb3e0596d6256223134fb1798cc1d1ddfa6ce97ca531ca9"}}}}]}]}, 0x10c6) [ 2801.299339] blktrace: Concurrent blktraces are not allowed on loop14 20:19:16 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 43) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2816.334538] loop1: detected capacity change from 0 to 33559552 20:19:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4c000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:19:16 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000340), 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0x50, 0x0, 0x10, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfd6b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}]}]}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xe}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffac}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x20004800}, 0x2000) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="6e2dceaae653cc7f0000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) getsockname(r2, &(0x7f00000003c0)=@xdp, &(0x7f00000001c0)=0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x1000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003f00)={0x0, 0x0, 0x0}, &(0x7f0000003f40)=0xc) setxattr$system_posix_acl(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000800)='system.posix_acl_access\x00', &(0x7f0000003f80)={{}, {0x1, 0x6}, [{0x2, 0x5}], {0x4, 0x3}, [{0x8, 0x3}, {0x8, 0x4, r4}], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x2) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) lseek(r1, 0x48, 0x7) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xfc, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0x2b8000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:16 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x4000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:19:16 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:16 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x148, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:19:16 executing program 3: stat(&(0x7f0000000000)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180), 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) [ 2816.389744] blktrace: Concurrent blktraces are not allowed on loop14 [ 2816.442027] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2816.442027] program syz-executor.1 not setting count and/or reply_len properly [ 2816.454190] FAULT_INJECTION: forcing a failure. [ 2816.454190] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2816.456804] CPU: 1 PID: 14816 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2816.458293] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2816.460047] Call Trace: [ 2816.460611] dump_stack+0x107/0x167 [ 2816.461387] should_fail.cold+0x5/0xa [ 2816.462209] copy_page_from_iter+0x40a/0x900 [ 2816.463153] blk_rq_map_user_iov+0x138b/0x1a60 [ 2816.464132] ? blk_rq_unmap_user+0x750/0x750 [ 2816.465068] ? find_held_lock+0x2c/0x110 [ 2816.465952] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2816.467071] ? lock_downgrade+0x6d0/0x6d0 [ 2816.467950] ? import_single_range+0x24d/0x2e0 [ 2816.468921] blk_rq_map_user+0x103/0x170 [ 2816.469803] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2816.470806] ? alloc_pages_current+0x18f/0x280 [ 2816.471786] ? sg_build_indirect.isra.0+0x448/0x710 [ 2816.472851] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2816.473976] ? sg_build_indirect.isra.0+0x710/0x710 [ 2816.475029] ? vprintk_func+0x93/0x140 [ 2816.475860] ? record_print_text.cold+0x16/0x16 [ 2816.476847] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2816.477928] ? trace_hardirqs_on+0x5b/0x180 [ 2816.478859] sg_write.part.0+0x69e/0xaa0 [ 2816.479719] ? sg_new_write.isra.0+0x770/0x770 [ 2816.480695] ? find_held_lock+0x2c/0x110 [ 2816.481566] ? __might_fault+0xd3/0x180 [ 2816.482413] ? lock_downgrade+0x6d0/0x6d0 [ 2816.483302] ? _cond_resched+0x10/0x30 [ 2816.484121] ? inode_security+0x107/0x140 [ 2816.485001] ? avc_policy_seqno+0x9/0x70 [ 2816.485875] ? selinux_file_permission+0x92/0x520 [ 2816.486903] sg_write+0x87/0x120 [ 2816.487631] do_iter_write+0x4f0/0x700 [ 2816.488461] ? import_iovec+0x83/0xb0 [ 2816.489269] vfs_writev+0x1ae/0x620 [ 2816.490049] ? vfs_iter_write+0xa0/0xa0 [ 2816.490888] ? __fget_files+0x2cf/0x520 [ 2816.491727] ? lock_downgrade+0x6d0/0x6d0 [ 2816.492596] ? find_held_lock+0x2c/0x110 [ 2816.493472] ? ksys_write+0x12d/0x260 [ 2816.494291] ? __fget_files+0x2f8/0x520 [ 2816.495138] ? __fget_light+0xea/0x290 [ 2816.495970] do_writev+0x139/0x300 [ 2816.496728] ? vfs_writev+0x620/0x620 [ 2816.497553] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2816.498665] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2816.499752] do_syscall_64+0x33/0x40 [ 2816.500541] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2816.501638] RIP: 0033:0x7f952207fb19 [ 2816.502424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2816.506324] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2816.507950] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2816.509462] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2816.510975] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2816.512486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2816.514004] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:19:16 executing program 3: stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x400, 0x100) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:19:17 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x5, 0x0, 0x0, 0x0, 0x6, 0xd4a45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x0, 0x1}, 0x1000, 0x80000000000, 0x4, 0x4, 0x6, 0xfffffffc, 0xfffc}, 0x0, 0x2, 0xffffffffffffffff, 0x0) 20:19:17 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 44) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:19:17 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:17 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x14c, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:19:17 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x21) open$dir(&(0x7f0000000340)='./file0\x00', 0xc0040, 0x5) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00') openat(r2, &(0x7f00000001c0)='./file0\x00', 0xc0280, 0x24) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x8000, &(0x7f0000000580)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid}, {@version_L}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'ext3\x00'}}]}}) 20:19:17 executing program 3: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setxattr$incfs_size(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=0xfffffffffffffffa, 0x8, 0x3) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x8, 0x3) 20:19:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2816.791246] blktrace: Concurrent blktraces are not allowed on loop14 20:19:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2816.927479] loop1: detected capacity change from 0 to 33559552 [ 2817.060165] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2817.060165] program syz-executor.1 not setting count and/or reply_len properly [ 2817.064257] FAULT_INJECTION: forcing a failure. [ 2817.064257] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2817.066717] CPU: 1 PID: 14865 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2817.068172] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2817.069919] Call Trace: [ 2817.070479] dump_stack+0x107/0x167 [ 2817.071244] should_fail.cold+0x5/0xa [ 2817.072063] copy_page_from_iter+0x40a/0x900 [ 2817.072999] blk_rq_map_user_iov+0x138b/0x1a60 [ 2817.073989] ? blk_rq_unmap_user+0x750/0x750 [ 2817.074924] ? find_held_lock+0x2c/0x110 [ 2817.075786] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2817.076910] ? lock_downgrade+0x6d0/0x6d0 [ 2817.077787] ? import_single_range+0x24d/0x2e0 [ 2817.078756] blk_rq_map_user+0x103/0x170 [ 2817.079611] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2817.080610] ? alloc_pages_current+0x18f/0x280 [ 2817.081585] ? sg_build_indirect.isra.0+0x448/0x710 [ 2817.082644] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2817.083756] ? sg_build_indirect.isra.0+0x710/0x710 [ 2817.084802] ? vprintk_func+0x93/0x140 [ 2817.085632] ? record_print_text.cold+0x16/0x16 [ 2817.086609] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2817.087666] ? trace_hardirqs_on+0x5b/0x180 [ 2817.088580] sg_write.part.0+0x69e/0xaa0 [ 2817.089439] ? sg_new_write.isra.0+0x770/0x770 [ 2817.090418] ? find_held_lock+0x2c/0x110 [ 2817.091281] ? __might_fault+0xd3/0x180 [ 2817.092117] ? lock_downgrade+0x6d0/0x6d0 [ 2817.093004] ? _cond_resched+0x10/0x30 [ 2817.093832] ? inode_security+0x107/0x140 [ 2817.094704] ? avc_policy_seqno+0x9/0x70 [ 2817.095561] ? selinux_file_permission+0x92/0x520 [ 2817.096589] sg_write+0x87/0x120 [ 2817.097301] do_iter_write+0x4f0/0x700 [ 2817.098137] ? import_iovec+0x83/0xb0 [ 2817.098942] vfs_writev+0x1ae/0x620 [ 2817.099714] ? vfs_iter_write+0xa0/0xa0 [ 2817.100550] ? __fget_files+0x2cf/0x520 [ 2817.101391] ? lock_downgrade+0x6d0/0x6d0 [ 2817.102266] ? find_held_lock+0x2c/0x110 [ 2817.103129] ? ksys_write+0x12d/0x260 [ 2817.103936] ? __fget_files+0x2f8/0x520 [ 2817.104785] ? __fget_light+0xea/0x290 [ 2817.105616] do_writev+0x139/0x300 [ 2817.106366] ? vfs_writev+0x620/0x620 [ 2817.107171] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2817.108276] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2817.109361] do_syscall_64+0x33/0x40 [ 2817.110154] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2817.111229] RIP: 0033:0x7f952207fb19 [ 2817.112014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2817.115893] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2817.117501] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2817.118998] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2817.120509] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2817.122021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2817.123518] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:19:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x53ef0000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:19:32 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', 0x0, 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:32 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 45) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:19:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xc4, 0x0, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKMODES_OURS={0x5c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x56, 0x4, "726a9c007380590e93adba5b6969a8c2520336f8d80ee27dae3108ea0f49f0f8bc04f4359326ebbab559aaf2a92066390a04264b4cb46c4c66fca546656a3018f867d3fe060d4e2771ea4f613d18fc51a640"}]}, @ETHTOOL_A_LINKMODES_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x404000c}, 0x10000044) setresuid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2832.090678] loop1: detected capacity change from 0 to 33559552 [ 2832.095305] blktrace: Concurrent blktraces are not allowed on loop14 20:19:32 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1c, 0x0, 0x30b, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x7e}, @void, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000c044}, 0x810) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rseq(0x0, 0x0, 0x1, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000003c0)=ANY=[@ANYBLOB='grpjquota=./file0,uid>', @ANYRESDEC=0x0, @ANYBLOB="290079828d50a5a3bb21e0c5c2abcf350c025510067d0090ac05a80c19e13efc52cf8dd8676101a5cc112ab78ebe047ef8075b6d681e171ad607256fae4a99cc38237d9ec90e457168be50ce3ca992b8b561290a32b43e740eacbdd9aa956533be1a9f76d31340565145f17119684cfa9545ef5b63125c2cd5db635dea8124ef2a5e6be00042317ff0144ddce53360de5b6a30633fea1a4800eff978842ae83230"]) 20:19:32 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x168, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:19:32 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:32 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x5000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) [ 2832.183369] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2832.183369] program syz-executor.1 not setting count and/or reply_len properly [ 2832.221926] FAULT_INJECTION: forcing a failure. [ 2832.221926] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2832.224467] CPU: 1 PID: 14897 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2832.225954] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2832.227698] Call Trace: [ 2832.228253] dump_stack+0x107/0x167 [ 2832.229028] should_fail.cold+0x5/0xa [ 2832.229842] copy_page_from_iter+0x40a/0x900 [ 2832.230765] blk_rq_map_user_iov+0x138b/0x1a60 [ 2832.231753] ? blk_rq_unmap_user+0x750/0x750 [ 2832.232692] ? find_held_lock+0x2c/0x110 [ 2832.233553] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2832.234695] ? lock_downgrade+0x6d0/0x6d0 [ 2832.235563] ? import_single_range+0x24d/0x2e0 [ 2832.236548] blk_rq_map_user+0x103/0x170 [ 2832.237416] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2832.238443] ? alloc_pages_current+0x18f/0x280 [ 2832.239426] ? sg_build_indirect.isra.0+0x448/0x710 [ 2832.240504] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2832.241635] ? sg_build_indirect.isra.0+0x710/0x710 [ 2832.242712] ? vprintk_func+0x93/0x140 [ 2832.243556] ? record_print_text.cold+0x16/0x16 [ 2832.244553] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2832.245633] ? trace_hardirqs_on+0x5b/0x180 [ 2832.246580] sg_write.part.0+0x69e/0xaa0 [ 2832.247453] ? sg_new_write.isra.0+0x770/0x770 [ 2832.248439] ? find_held_lock+0x2c/0x110 [ 2832.249311] ? __might_fault+0xd3/0x180 20:19:32 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2832.250169] ? lock_downgrade+0x6d0/0x6d0 [ 2832.251290] ? _cond_resched+0x10/0x30 [ 2832.252123] ? inode_security+0x107/0x140 [ 2832.253004] ? avc_policy_seqno+0x9/0x70 [ 2832.253881] ? selinux_file_permission+0x92/0x520 [ 2832.254911] sg_write+0x87/0x120 [ 2832.255632] do_iter_write+0x4f0/0x700 [ 2832.256467] ? import_iovec+0x83/0xb0 [ 2832.257279] vfs_writev+0x1ae/0x620 20:19:32 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', 0x0, 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2832.258063] ? vfs_iter_write+0xa0/0xa0 [ 2832.259064] ? __fget_files+0x2cf/0x520 [ 2832.259918] ? lock_downgrade+0x6d0/0x6d0 [ 2832.260797] ? find_held_lock+0x2c/0x110 [ 2832.261682] ? ksys_write+0x12d/0x260 [ 2832.262503] ? __fget_files+0x2f8/0x520 [ 2832.263367] ? __fget_light+0xea/0x290 [ 2832.264209] do_writev+0x139/0x300 [ 2832.264970] ? vfs_writev+0x620/0x620 [ 2832.265802] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2832.266926] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2832.268038] do_syscall_64+0x33/0x40 [ 2832.268834] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2832.269934] RIP: 0033:0x7f952207fb19 [ 2832.270734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2832.274671] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2832.276289] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2832.277824] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2832.279356] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2832.280878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2832.282426] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:19:32 executing program 3: connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xfffb, @any, 0x9, 0x2}, 0xe) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:19:32 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x16c, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:19:32 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2832.515748] blktrace: Concurrent blktraces are not allowed on loop14 20:19:33 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 46) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:19:33 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f0000001900)={0x1d, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e23, @loopback}}}, 0x108) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:33 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', 0x0, 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2832.678410] loop1: detected capacity change from 0 to 33559552 [ 2832.814995] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2832.814995] program syz-executor.1 not setting count and/or reply_len properly [ 2832.829698] FAULT_INJECTION: forcing a failure. [ 2832.829698] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2832.832123] CPU: 1 PID: 14938 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2832.833524] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2832.835225] Call Trace: [ 2832.835768] dump_stack+0x107/0x167 [ 2832.836515] should_fail.cold+0x5/0xa [ 2832.837294] copy_page_from_iter+0x40a/0x900 [ 2832.838208] blk_rq_map_user_iov+0x138b/0x1a60 [ 2832.839156] ? blk_rq_unmap_user+0x750/0x750 [ 2832.840049] ? find_held_lock+0x2c/0x110 [ 2832.840952] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2832.842270] ? lock_downgrade+0x6d0/0x6d0 [ 2832.843272] ? import_single_range+0x24d/0x2e0 [ 2832.844190] blk_rq_map_user+0x103/0x170 [ 2832.845012] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2832.845973] ? alloc_pages_current+0x18f/0x280 [ 2832.846884] ? sg_build_indirect.isra.0+0x448/0x710 [ 2832.847942] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2832.849201] ? sg_build_indirect.isra.0+0x710/0x710 [ 2832.850368] ? vprintk_func+0x93/0x140 [ 2832.851249] ? record_print_text.cold+0x16/0x16 [ 2832.852286] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2832.853404] ? trace_hardirqs_on+0x5b/0x180 [ 2832.854404] sg_write.part.0+0x69e/0xaa0 [ 2832.855326] ? sg_new_write.isra.0+0x770/0x770 [ 2832.856347] ? find_held_lock+0x2c/0x110 [ 2832.857281] ? __might_fault+0xd3/0x180 [ 2832.858137] ? lock_downgrade+0x6d0/0x6d0 [ 2832.859008] ? _cond_resched+0x10/0x30 [ 2832.859886] ? inode_security+0x107/0x140 [ 2832.860850] ? avc_policy_seqno+0x9/0x70 [ 2832.861814] ? selinux_file_permission+0x92/0x520 [ 2832.862948] sg_write+0x87/0x120 [ 2832.863750] do_iter_write+0x4f0/0x700 [ 2832.864553] ? import_iovec+0x83/0xb0 [ 2832.865315] vfs_writev+0x1ae/0x620 [ 2832.866073] ? vfs_iter_write+0xa0/0xa0 [ 2832.866865] ? __fget_files+0x2cf/0x520 [ 2832.867662] ? lock_downgrade+0x6d0/0x6d0 [ 2832.868480] ? find_held_lock+0x2c/0x110 [ 2832.869296] ? ksys_write+0x12d/0x260 [ 2832.870064] ? __fget_files+0x2f8/0x520 [ 2832.870874] ? __fget_light+0xea/0x290 [ 2832.871656] do_writev+0x139/0x300 [ 2832.872376] ? vfs_writev+0x620/0x620 [ 2832.873143] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2832.874216] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2832.875241] do_syscall_64+0x33/0x40 [ 2832.875981] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2832.877020] RIP: 0033:0x7f952207fb19 [ 2832.877760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2832.881439] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2832.882964] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2832.884386] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2832.885810] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2832.887230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2832.888672] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:19:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x68000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:19:50 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 47) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:19:50 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x174, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:19:50 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x6000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:19:50 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:50 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:50 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x517a, &(0x7f0000001940)={0x0, 0x5cde, 0x0, 0x2, 0x3ac}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000019c0), &(0x7f0000001a00)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001a40)=@IORING_OP_READ_FIXED={0x4, 0x5, 0x4000, @fd_index=0x7, 0xfffffffffffffff8, 0xfff, 0x7ff, 0xc, 0x1, {0x1}}, 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000001c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='hfsplus\x00', 0x6008, &(0x7f0000000400)='proc\x00') waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) sendmmsg$sock(r0, &(0x7f0000001900)=[{{&(0x7f0000000440)=@nfc_llcp={0x27, 0x1, 0x0, 0x4, 0x9, 0x0, "fc21b5456b43fbd4298ffe107b2611bc05063a57d8a1a0e09b190add9947bac3880e879145fc6bed005725c59ea4ccfbd91bd73f47c7c110fd4ee9e93af260", 0x14}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000540)="abf12657910610c6b1ab2d38b532b12ae90f164204978c7d2d2b0c36566dbab0acbc18685bd095d686f3a08d3c6e4e650d3b2bc70f90417e804beeca49dc2519bb5e4fe523eceb28ff3e8a636bd515ca7dd1d39311704411045452747a500b7b3c0642566bc2635e2b315a72846631fdbcc5039e72528681a901b5e5f4caad94d704c20eae617000d612e18123825cdeff39282e79d168dde9578227ae068674faabddb451c2a26b46ad38de7532526c0844e2b89622b0b7f4e7f8027e7e20", 0xbf}], 0x1, &(0x7f0000000840)=[@txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x7f03}}], 0x30}}], 0x1, 0x40011) r2 = syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) futimesat(r2, &(0x7f0000001a80)='./file0\x00', &(0x7f0000001ac0)={{}, {0x77359400}}) 20:19:50 executing program 3: setresuid(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) ioprio_set$uid(0x0, r2, 0x4007) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r3, &(0x7f0000000000)='./file0\x00', r4, &(0x7f0000000040)='./file0\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5, r1}}, './file0\x00'}) setresuid(0xffffffffffffffff, r0, 0x0) r6 = getuid() stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r7, 0x0) setresuid(r0, r6, r7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2849.915457] loop1: detected capacity change from 0 to 33559552 20:19:50 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {0x0, 0x0, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2850.025400] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2850.025400] program syz-executor.1 not setting count and/or reply_len properly [ 2850.029257] FAULT_INJECTION: forcing a failure. [ 2850.029257] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2850.031873] CPU: 1 PID: 14956 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2850.033350] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2850.035123] Call Trace: [ 2850.035694] dump_stack+0x107/0x167 [ 2850.036482] should_fail.cold+0x5/0xa [ 2850.037355] copy_page_from_iter+0x40a/0x900 [ 2850.038330] blk_rq_map_user_iov+0x138b/0x1a60 [ 2850.039345] ? blk_rq_unmap_user+0x750/0x750 [ 2850.040300] ? find_held_lock+0x2c/0x110 [ 2850.041187] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2850.042347] ? lock_downgrade+0x6d0/0x6d0 [ 2850.043221] ? import_single_range+0x24d/0x2e0 [ 2850.044201] blk_rq_map_user+0x103/0x170 [ 2850.045056] ? blk_rq_map_user_iov+0x1a60/0x1a60 20:19:50 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2850.046080] ? alloc_pages_current+0x18f/0x280 [ 2850.047201] ? sg_build_indirect.isra.0+0x448/0x710 [ 2850.048261] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2850.049384] ? sg_build_indirect.isra.0+0x710/0x710 [ 2850.050440] ? vprintk_func+0x93/0x140 [ 2850.051268] ? record_print_text.cold+0x16/0x16 [ 2850.052254] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2850.053318] ? trace_hardirqs_on+0x5b/0x180 [ 2850.054248] sg_write.part.0+0x69e/0xaa0 [ 2850.055098] ? sg_new_write.isra.0+0x770/0x770 [ 2850.056065] ? find_held_lock+0x2c/0x110 [ 2850.056925] ? __might_fault+0xd3/0x180 [ 2850.057766] ? lock_downgrade+0x6d0/0x6d0 [ 2850.058663] ? _cond_resched+0x10/0x30 [ 2850.059482] ? inode_security+0x107/0x140 [ 2850.060356] ? avc_policy_seqno+0x9/0x70 [ 2850.061205] ? selinux_file_permission+0x92/0x520 [ 2850.062231] sg_write+0x87/0x120 [ 2850.062950] do_iter_write+0x4f0/0x700 [ 2850.063770] ? import_iovec+0x83/0xb0 [ 2850.064577] vfs_writev+0x1ae/0x620 [ 2850.065344] ? vfs_iter_write+0xa0/0xa0 [ 2850.066187] ? __fget_files+0x2cf/0x520 [ 2850.067020] ? lock_downgrade+0x6d0/0x6d0 [ 2850.067885] ? find_held_lock+0x2c/0x110 [ 2850.068748] ? ksys_write+0x12d/0x260 [ 2850.069549] ? __fget_files+0x2f8/0x520 [ 2850.070406] ? __fget_light+0xea/0x290 [ 2850.071231] do_writev+0x139/0x300 [ 2850.071984] ? vfs_writev+0x620/0x620 [ 2850.072787] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2850.073886] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2850.074982] do_syscall_64+0x33/0x40 [ 2850.075767] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2850.076846] RIP: 0033:0x7f952207fb19 [ 2850.077635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2850.081507] RSP: 002b:00007f951f5f5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2850.083112] RAX: ffffffffffffffda RBX: 00007f9522192f60 RCX: 00007f952207fb19 [ 2850.084612] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 000000000000000a [ 2850.086130] RBP: 00007f951f5f51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2850.087621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2850.089119] R13: 00007ffd2a29b96f R14: 00007f951f5f5300 R15: 0000000000022000 20:19:50 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x17a, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:19:50 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 48) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:19:50 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {0x0}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2850.215710] blktrace: Concurrent blktraces are not allowed on loop14 20:19:50 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f00000013c0)={{'\x00', 0x3}, {0x8}, 0x180, 0x0, 0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)="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", 0x1d8, 0x0, &(0x7f0000000280)={0x2, 0x1068, {0x1, 0xc, 0x5b, "06fd3c7b6a3920ae4bb3c7cff22b883973bd4056659c47c74089d1d65a367c916b8eb6fb7e784fc9e78e1612f181338bb097cf373e097913326ff5633f04abc9e2048e28492e85c694da69122d2180111955a5786436aadcb5e27b", 0x1000, "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"}, 0xa2, "83aabfac1e49e001fd94d5ed042f499413a34a895cbc0d5d2193172bad3038da137f957cd90d8bc84f9c9e60a2b2d38d86164d3d6d39da82bc3b693bad465e5dfe05bc043a38cca579567d89e4996f212a240b6048660fa16c1ade1af97f46613cedfe1c0663d8df30c67431c1e30f00ec47a86ccb6a424b8d3e7b0b210078924a3b76fadf3f41acda9f2317afddb7227f8f4512266944755f5e11e1558bb54ec5a2"}, 0x1116}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:19:50 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:19:50 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2850.319113] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2850.319113] program syz-executor.1 not setting count and/or reply_len properly [ 2850.322793] FAULT_INJECTION: forcing a failure. [ 2850.322793] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2850.325281] CPU: 1 PID: 15002 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2850.326728] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2850.328442] Call Trace: [ 2850.328990] dump_stack+0x107/0x167 [ 2850.329752] should_fail.cold+0x5/0xa [ 2850.330582] copy_page_from_iter+0x40a/0x900 [ 2850.331503] blk_rq_map_user_iov+0x138b/0x1a60 [ 2850.332454] ? blk_rq_unmap_user+0x750/0x750 [ 2850.333363] ? find_held_lock+0x2c/0x110 [ 2850.334223] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2850.335315] ? lock_downgrade+0x6d0/0x6d0 [ 2850.336167] ? import_single_range+0x24d/0x2e0 [ 2850.337110] blk_rq_map_user+0x103/0x170 [ 2850.337957] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2850.338945] ? alloc_pages_current+0x18f/0x280 [ 2850.339896] ? sg_build_indirect.isra.0+0x448/0x710 [ 2850.340930] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2850.342032] ? sg_build_indirect.isra.0+0x710/0x710 [ 2850.343070] ? vprintk_func+0x93/0x140 [ 2850.343880] ? record_print_text.cold+0x16/0x16 [ 2850.344852] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2850.345907] ? trace_hardirqs_on+0x5b/0x180 [ 2850.346819] sg_write.part.0+0x69e/0xaa0 [ 2850.347819] ? sg_new_write.isra.0+0x770/0x770 [ 2850.348940] ? find_held_lock+0x2c/0x110 [ 2850.349913] ? __might_fault+0xd3/0x180 [ 2850.350886] ? lock_downgrade+0x6d0/0x6d0 [ 2850.351955] ? _cond_resched+0x10/0x30 [ 2850.352931] ? inode_security+0x107/0x140 [ 2850.353977] ? avc_policy_seqno+0x9/0x70 [ 2850.355013] ? selinux_file_permission+0x92/0x520 [ 2850.356236] sg_write+0x87/0x120 [ 2850.357050] do_iter_write+0x4f0/0x700 [ 2850.357863] ? import_iovec+0x83/0xb0 [ 2850.358656] vfs_writev+0x1ae/0x620 [ 2850.359406] ? vfs_iter_write+0xa0/0xa0 [ 2850.360228] ? __fget_files+0x2cf/0x520 [ 2850.361047] ? lock_downgrade+0x6d0/0x6d0 [ 2850.361903] ? find_held_lock+0x2c/0x110 [ 2850.362761] ? ksys_write+0x12d/0x260 [ 2850.363544] ? __fget_files+0x2f8/0x520 [ 2850.364369] ? __fget_light+0xea/0x290 [ 2850.365177] do_writev+0x139/0x300 [ 2850.365909] ? vfs_writev+0x620/0x620 [ 2850.366703] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2850.367779] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2850.368843] do_syscall_64+0x33/0x40 [ 2850.369605] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2850.370658] RIP: 0033:0x7f952207fb19 [ 2850.371423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2850.375251] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2850.376819] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2850.378330] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000007 [ 2850.379790] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2850.381267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2850.382743] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:20:07 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x300, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:20:07 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x7000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:20:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6c000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:20:07 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000002000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x4}}, './file0\x00'}) 20:20:07 executing program 3: stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001340)={0x0, 0x0}, &(0x7f0000001380)=0xc) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r5, r6, 0x1000) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x4, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000180)="744e078c3561a0619ea9c8d139bf1ecacc6ff893cf7406404e793097e0d509acbedb08e6a7c42d4bb5c7cd34a23ce3e6e1a3c7b5e9cc3ef056b2bb2004dde96426cdf97cc3b288a1ef3130450599f6e8e7999c3793172ac5f04f2e22bbb8f1556d62c0b13a370b93", 0x68, 0x200}, {&(0x7f0000000200)="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", 0x1000, 0x1ff}, {&(0x7f0000001200)="ee0cb77b28853aad877025c7ca054d359f6e623213e5d90f73fe2b6f0c872512b99ae763ef5d9d314cc8c3c09ec6e13191323afd5502b41c719be6dd9a8f6d3eb61d86a935831c6716f534bcbf7e60f02ac36fe8b05817a5feee9610d8e6fdfefdec33e7d0d3b0032f1d8fca54bd52e23da8049fa91f6229c83e8bb3c3452427736939b8df62c83c460a7af617fa60fd6132edf406aa", 0x96, 0x7ff}], 0x0, &(0x7f00000013c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x70]}}, {@huge_always}, {@huge_advise}, {@huge_advise}, {@uid={'uid', 0x3d, r4}}, {@mpol={'mpol', 0x3d, {'interleave', '=static', @void}}}, {@gid={'gid', 0x3d, r6}}, {@gid={'gid', 0x3d, r1}}], [{@fsmagic}]}) kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7, 0x7, 0x6, 0x6, 0x0, 0x0, 0x40c1, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x40008, 0x1000, 0x9, 0x5, 0xaa, 0x4, 0x3, 0x0, 0xffff, 0x0, 0x1f}, r3, 0x7, 0xffffffffffffffff, 0x0) 20:20:07 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {0x0}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:07 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 49) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2866.617944] blktrace: Concurrent blktraces are not allowed on loop14 [ 2866.644624] loop3: detected capacity change from 0 to 4096 [ 2866.653853] tmpfs: Unsupported parameter 'huge' [ 2866.723976] loop1: detected capacity change from 0 to 33559552 [ 2866.733167] loop3: detected capacity change from 0 to 4096 [ 2866.735762] tmpfs: Unsupported parameter 'huge' 20:20:07 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) quotactl(0x3a6, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)="634af3a1b6c05920e891ca141ce2ee24395f6b3fd9f948dd865babc84c1bb15ab70b9292aba75119e80bb86daa87052c2da903dc67a1497e4542d2b271c6429e5770588fb941263de8497f6e7d28d26a8a9dfe8b23820bb142cb7a37fcd2598184b58ad8b325e2435b324b9154b7b7f1e2356bec30e7388b1e88ecdfbdf7bc45a90d5697b863585a3642dc674b4da91751e3f8d2f1316d66183433f4bd32fe5015b9cd5ae3bbd571494244e9013186fc") [ 2866.846330] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2866.846330] program syz-executor.1 not setting count and/or reply_len properly [ 2866.859887] FAULT_INJECTION: forcing a failure. [ 2866.859887] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2866.862816] CPU: 1 PID: 15045 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2866.864288] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2866.866136] Call Trace: [ 2866.866722] dump_stack+0x107/0x167 [ 2866.867494] should_fail.cold+0x5/0xa [ 2866.868310] copy_page_from_iter+0x40a/0x900 [ 2866.869290] blk_rq_map_user_iov+0x138b/0x1a60 [ 2866.870451] ? blk_rq_unmap_user+0x750/0x750 [ 2866.871508] ? find_held_lock+0x2c/0x110 [ 2866.872361] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2866.873585] ? lock_downgrade+0x6d0/0x6d0 [ 2866.874488] ? import_single_range+0x24d/0x2e0 [ 2866.875582] blk_rq_map_user+0x103/0x170 [ 2866.876444] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2866.877564] ? alloc_pages_current+0x18f/0x280 [ 2866.878597] ? sg_build_indirect.isra.0+0x448/0x710 [ 2866.879699] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2866.880935] ? sg_build_indirect.isra.0+0x710/0x710 [ 2866.882103] ? vprintk_func+0x93/0x140 [ 2866.883007] ? record_print_text.cold+0x16/0x16 [ 2866.883993] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2866.885189] ? trace_hardirqs_on+0x5b/0x180 [ 2866.886110] sg_write.part.0+0x69e/0xaa0 [ 2866.886966] ? sg_new_write.isra.0+0x770/0x770 [ 2866.887947] ? find_held_lock+0x2c/0x110 [ 2866.888816] ? __might_fault+0xd3/0x180 [ 2866.889683] ? lock_downgrade+0x6d0/0x6d0 [ 2866.890582] ? _cond_resched+0x10/0x30 [ 2866.891402] ? inode_security+0x107/0x140 [ 2866.892273] ? avc_policy_seqno+0x9/0x70 [ 2866.893125] ? selinux_file_permission+0x92/0x520 [ 2866.894175] sg_write+0x87/0x120 [ 2866.894904] do_iter_write+0x4f0/0x700 [ 2866.895733] ? import_iovec+0x83/0xb0 [ 2866.896545] vfs_writev+0x1ae/0x620 [ 2866.897319] ? vfs_iter_write+0xa0/0xa0 [ 2866.898187] ? __fget_files+0x2cf/0x520 [ 2866.899010] ? lock_downgrade+0x6d0/0x6d0 [ 2866.899879] ? find_held_lock+0x2c/0x110 [ 2866.900743] ? ksys_write+0x12d/0x260 [ 2866.901552] ? __fget_files+0x2f8/0x520 [ 2866.902457] ? __fget_light+0xea/0x290 [ 2866.903396] do_writev+0x139/0x300 [ 2866.904161] ? vfs_writev+0x620/0x620 [ 2866.905018] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2866.906231] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2866.907317] do_syscall_64+0x33/0x40 [ 2866.908110] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2866.909173] RIP: 0033:0x7f952207fb19 [ 2866.910037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2866.914236] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2866.915831] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2866.917396] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2866.918966] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2866.920485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2866.922207] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:20:07 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {0x0}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:07 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x500, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:20:07 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x0, 0x0, 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:07 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x94a25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:20:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') renameat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000340)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={0x0}}, 0x20000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f00000001c0)={'wg1\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/191) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x2, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)=ANY=[@ANYBLOB="677270b8fa6374da62e7acfcc632b1796a71756f7461", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:20:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 50) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:20:07 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x0, 0x0, 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:07 executing program 3: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94a21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x0) [ 2867.386586] loop1: detected capacity change from 0 to 33559552 [ 2867.523986] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2867.523986] program syz-executor.1 not setting count and/or reply_len properly [ 2867.528617] FAULT_INJECTION: forcing a failure. [ 2867.528617] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2867.531377] CPU: 1 PID: 15088 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2867.532932] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2867.534779] Call Trace: [ 2867.535378] dump_stack+0x107/0x167 [ 2867.536198] should_fail.cold+0x5/0xa [ 2867.537051] copy_page_from_iter+0x40a/0x900 [ 2867.538039] blk_rq_map_user_iov+0x138b/0x1a60 [ 2867.539082] ? blk_rq_unmap_user+0x750/0x750 [ 2867.540074] ? find_held_lock+0x2c/0x110 [ 2867.540985] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2867.542179] ? lock_downgrade+0x6d0/0x6d0 [ 2867.543103] ? import_single_range+0x24d/0x2e0 [ 2867.544126] blk_rq_map_user+0x103/0x170 [ 2867.545029] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2867.546186] ? alloc_pages_current+0x18f/0x280 [ 2867.547372] ? sg_build_indirect.isra.0+0x448/0x710 [ 2867.548629] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2867.549925] ? sg_build_indirect.isra.0+0x710/0x710 [ 2867.551135] ? vprintk_func+0x93/0x140 [ 2867.552084] ? record_print_text.cold+0x16/0x16 [ 2867.553191] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2867.554438] ? trace_hardirqs_on+0x5b/0x180 [ 2867.555427] sg_write.part.0+0x69e/0xaa0 [ 2867.556443] ? sg_new_write.isra.0+0x770/0x770 [ 2867.557631] ? find_held_lock+0x2c/0x110 [ 2867.558682] ? __might_fault+0xd3/0x180 [ 2867.559689] ? lock_downgrade+0x6d0/0x6d0 [ 2867.560866] ? _cond_resched+0x10/0x30 [ 2867.561911] ? inode_security+0x107/0x140 [ 2867.562832] ? avc_policy_seqno+0x9/0x70 [ 2867.563713] ? selinux_file_permission+0x92/0x520 [ 2867.564775] sg_write+0x87/0x120 [ 2867.565517] do_iter_write+0x4f0/0x700 [ 2867.566381] ? import_iovec+0x83/0xb0 [ 2867.567214] vfs_writev+0x1ae/0x620 [ 2867.568008] ? vfs_iter_write+0xa0/0xa0 [ 2867.568877] ? __fget_files+0x2cf/0x520 [ 2867.569742] ? lock_downgrade+0x6d0/0x6d0 [ 2867.570651] ? find_held_lock+0x2c/0x110 [ 2867.571540] ? ksys_write+0x12d/0x260 [ 2867.572374] ? __fget_files+0x2f8/0x520 [ 2867.573248] ? __fget_light+0xea/0x290 [ 2867.574100] do_writev+0x139/0x300 [ 2867.574886] ? vfs_writev+0x620/0x620 [ 2867.575718] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2867.576857] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2867.577980] do_syscall_64+0x33/0x40 [ 2867.578795] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2867.579909] RIP: 0033:0x7f952207fb19 [ 2867.580723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2867.584739] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2867.586403] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2867.587955] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2867.589508] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2867.591071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2867.592623] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:20:23 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 51) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:20:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x74000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:20:23 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x8000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:20:23 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000001880)=[{0x0, 0x0, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:23 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:23 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x0, 0x0, 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:23 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x69, 0x2, 0x6, 0x3, 0x0, 0x5, 0x8000, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0xfff, 0x30}, 0xb081, 0x7ff, 0xfffffffd, 0x8, 0x9, 0x3c059806, 0x9, 0x0, 0x7}, r1, 0xd, r0, 0xa) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000440), 0x121000, &(0x7f0000000540)={'trans=unix,', {[{@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@cache_none}, {@cache_none}, {@nodevmap}], [{@fsuuid={'fsuuid', 0x3d, {[0x39, 0x31, 0x64, 0x61, 0x35, 0x34, 0x62, 0x32], 0x2d, [0x65, 0x32, 0x66, 0x35], 0x2d, [0x61, 0x30, 0x32, 0x63], 0x2d, [0x30, 0x3, 0x1c, 0x31], 0x2d, [0x32, 0x39, 0x36, 0x36, 0x2, 0x65, 0x63, 0x61]}}}, {@hash}]}}) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:23 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xa00, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2883.370627] loop1: detected capacity change from 0 to 33559552 [ 2883.515010] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2883.515010] program syz-executor.1 not setting count and/or reply_len properly [ 2883.519917] FAULT_INJECTION: forcing a failure. [ 2883.519917] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2883.522563] CPU: 1 PID: 15119 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2883.524100] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2883.525967] Call Trace: [ 2883.526587] dump_stack+0x107/0x167 [ 2883.527410] should_fail.cold+0x5/0xa [ 2883.528282] copy_page_from_iter+0x40a/0x900 [ 2883.529288] blk_rq_map_user_iov+0x138b/0x1a60 [ 2883.530340] ? blk_rq_unmap_user+0x750/0x750 [ 2883.531357] ? find_held_lock+0x2c/0x110 [ 2883.532267] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2883.533447] ? lock_downgrade+0x6d0/0x6d0 [ 2883.534370] ? import_single_range+0x24d/0x2e0 [ 2883.535408] blk_rq_map_user+0x103/0x170 [ 2883.536310] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2883.537362] ? alloc_pages_current+0x18f/0x280 [ 2883.538389] ? sg_build_indirect.isra.0+0x448/0x710 [ 2883.539509] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2883.540682] ? sg_build_indirect.isra.0+0x710/0x710 [ 2883.541791] ? vprintk_func+0x93/0x140 [ 2883.542679] ? record_print_text.cold+0x16/0x16 [ 2883.543711] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2883.544829] ? trace_hardirqs_on+0x5b/0x180 [ 2883.545802] sg_write.part.0+0x69e/0xaa0 [ 2883.546720] ? sg_new_write.isra.0+0x770/0x770 [ 2883.547742] ? find_held_lock+0x2c/0x110 [ 2883.548647] ? __might_fault+0xd3/0x180 [ 2883.549534] ? lock_downgrade+0x6d0/0x6d0 [ 2883.550491] ? _cond_resched+0x10/0x30 [ 2883.551345] ? inode_security+0x107/0x140 [ 2883.552252] ? avc_policy_seqno+0x9/0x70 [ 2883.553139] ? selinux_file_permission+0x92/0x520 [ 2883.554202] sg_write+0x87/0x120 [ 2883.554964] do_iter_write+0x4f0/0x700 [ 2883.555819] ? import_iovec+0x83/0xb0 [ 2883.556667] vfs_writev+0x1ae/0x620 [ 2883.557614] ? vfs_iter_write+0xa0/0xa0 [ 2883.558717] ? __fget_files+0x2cf/0x520 [ 2883.559746] ? lock_downgrade+0x6d0/0x6d0 [ 2883.560780] ? find_held_lock+0x2c/0x110 [ 2883.561816] ? ksys_write+0x12d/0x260 [ 2883.562785] ? __fget_files+0x2f8/0x520 [ 2883.563690] ? __fget_light+0xea/0x290 [ 2883.564573] do_writev+0x139/0x300 [ 2883.565378] ? vfs_writev+0x620/0x620 [ 2883.566232] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2883.567417] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2883.568565] do_syscall_64+0x33/0x40 [ 2883.569502] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2883.570662] RIP: 0033:0x7f952207fb19 [ 2883.571498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2883.575612] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2883.577323] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2883.578927] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2883.580519] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2883.582110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2883.583793] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:20:24 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x2, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:24 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x4000000ff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f0000001900)="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", 0x160, 0x80}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3ff}], 0xa18000, &(0x7f00000007c0)={[{@bh}], [{@uid_gt}]}) 20:20:24 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x1, 0x6, &(0x7f0000001b00)=[{&(0x7f0000001e00)="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", 0x1000, 0x34}, {&(0x7f00000003c0)="ce957770e469062d595616ce06f7543115f295eaa5a23b1c4ed00c1902b554b55c0aeba68b735c2e41b7579553b2a42d949c276ce0a7c2c450202c558dbcb78d3b", 0x41, 0xff}, {&(0x7f0000000440)="5ff1b2ce", 0x4, 0x826}, {&(0x7f0000001900)="b0359b7bda41382ca6d666c58d1209e8b92242a0f1708ce757f134a112bce42fa5d701064b686b10a1d9588e52518d8524825cedeec3c92f0bed3249d7302509d04fa829e20b827b491a9fa9f7acd79a52d4109f12d169e6f1b01bf09aa2ec7fc668604b85cf1d680daf1588236e3d462cd0c231fe303426dc025fa82d849fcce1e65716a01187c25db6a92cb3f9f748a80a9b830c3a0d5cd617d73ee35cadbab3ea60b380ef46bdb9fc03a69ac850356dbd4ec75666f2e97625fceeb1bf317cc449a0fc4326a83225fb1d48d974b5b9c5", 0xd1, 0x7}, {&(0x7f0000000540)="732549c430de25506e9cea332bffdcb0b282b5b222884703be1f17bdfb0ed7764206480e346e5a1b9890477c89b5a4ddaa12d9a8cda67bb4a588c48304b682bd34f7eab72f557513b8bd3d37b1852497d49caff8f377bac5199888ae350c7c9f7c890a3b4702e02286c6f5c01a4b0bc07385568d4db0bcf6e2d8", 0x7a, 0x7ff}, {&(0x7f0000001a00)="b8d614499345b149ad2ebabde6b62ea6adcd9aeaefa90e3e80359e72b4ca393c0fabdcaf0e15d5d3426add721c2e77894fabb3cff29e88db5a8035f1a912a763f060238ace1afbcc0c8eb1ccca71b3854e91fd8382ad6f99e64a9df4d585542f271cff3a6f885dd7965a2ff57678690962301250b581aa2a29bd337bad718dd5c3f1a932b9a5f9be1d4f895df425ee721051983723b8ffc90d8189b7a28e1c6fc07aaf60299749c50642cd4fa50cb9762c773a9cb471af5f4e73dee7bad040fc7f4b08c3ca85b2a2c638596cdec7209d762a8c83b6cb0f5390e9", 0xda, 0x7}], 0x1000020, &(0x7f0000001bc0)={[{@uni_xlateno}, {@fat=@dos1xfloppy}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_winnt}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfsroot}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', r0}}, {@subj_user}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x8c00, 0x50) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:24 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 52) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2884.002975] loop2: detected capacity change from 0 to 135266304 20:20:24 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000001880)=[{0x0, 0x0, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:24 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xb91, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:20:24 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x2, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2884.091792] blktrace: Concurrent blktraces are not allowed on loop14 [ 2884.111453] loop1: detected capacity change from 0 to 33559552 20:20:24 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x1, 0x6, &(0x7f0000001b00)=[{&(0x7f0000001e00)="640ba47dcbed372b12812b5b33e9519c221fc2704999a8a1eead93af650e294a3863b78df5a9582e5c6252c1404ee120c4d5419e8fe0ad72f084427c83ee7619efb5550b7163595875434e04018f6435959b202ad6ba9232ee86619c154938307c177f6d1460dcae6da8c8308ead6b603b532afbf6420d80054a7bd3f08380bac8c6691af923afa66b83da66fd22f79f0380126ea8f94559996348f4c725e3d3028ba765b6aa78e4c0818296cafcee4884698efcd49436739dc887a0e7a84bcb94311b9d24a616b0b685484cc4942ea1ae72e27e20d12f60b8913edca3f58bcf57438dfb66815bcbe60835c86897732c2c732d8e358e32ee63af9b996b1793dd1fad2602cd7878eb09e834b9158f28c03619c354c25ff76deb6b521ced7e996e3e5d4637fb54c53a5be224068954fc1a97127b4b5bca90bea5e7e72d40834131a4f39eb83347951a377eaa18d453ebf45c0a94a2c09da97aabdf54c6f09e86d5a214ee0bd988580488b884bf6e706de58041ffab743ac8aba87ddb1154b420ec3644d12056d0d50b5fc93e9b49f10f5945468efc51a80f6dd6319859046f1b8f0eed3636a70349fedbf67d74ab42cb6f766a627a5695224f4859b7dd2060587141294c1d906c2c71c31d649e46c864cc5961294d199b57b02043fc38d6bb2da9267adbdcd3f9c6b1393fc3442d498912d435d48a2bdf83cd57d9bae1eedc626d54da418c603bc9ec9507f256fb6a8dc3a06c259f2c3cdd610f465e064871d6427b9079054d00160db253d46e53ea60ee64d982380b0e3c8cb455b7aa9134e9cb137b6b8dc2113e52048f82222fa31860b32bc314623bab73a0f1185233f9ce500001885f90f8c8bcfbd63b87af413aa8f4648537a4812a46b11b68eace97bba64838cef554cd68240efa3e1c5f36d4e4c278e360010443c590a146c18ac00aff0e9b510060ab0184b1243599e869a5b02b2e180df03a3537853d9392bde3734887f5d777db33448ff81089468b8bc194c56b24425f9eed31bb3ff05422c6822c92c37c2370c941c234faaaf95bcd5a312938e884d61953601582348a6a101c8b9d7c9a8a34a3c3444fd96f85dddc24e6d7e2d7152196af67b41ca7daff473521f5bc0a4a4543ed93e75893229a761285b45e0f9ad77c60ce9ff1307864dfbab732f1d4e8b966da2395e91d20420460163e4009a11bf400a2029f29ee3ac380380eda2e918cda27b45cd5ab2ee25bba0569c4564bbf8865b4274ef2280549b079063b9c808c6abb8529d622f13ecbb152b9c4832abfe48b0e0cf5287f9fa16879d7613016a7971e7a443bba1a1575b56709a33e129d0a25ad6405ea26376e3f47c51939f196493ebdf009fc01022bc8f38987a04bb1a3deec0dd322defaab77f8d8968c7b1335aa4cfbfada3a46311fc77321bfcdcb7f3618f3cc54af68765d681f606e908720172f5692f7dfcc368093f500f6f12056f30c9e07b78fe6364d650f24ff68824d07738419bbeea263138e831e0923e59df30dd6e39069ddc81f3800903ae3949d2e9a0e62365dc1edf18eec067cffc83d3431fc4fca0cfca472b4f180cd69dde5e095aaf5f52458c78721a433795ace6a3b37fbbadbf39fb99d3696e3caa34bd5961807fbbc4612663715538874a78fc8f770dae081b4252896c5cd2551463cfe37909d8f175823b8021ba49b759352530bbf6c5d8dee14e3c6b6689202ce0b66c621839f8c9a68721633ac4a51de73c090efd958f3cb98bed2112b577cf4191ac8ede74bf08214ce8f3a70bbf68d7f56fb3aee42bc64fb50302e63c4212078cd04e83d29663c180e278897376e5fcabc589d6ce925b5c23f7e0788cd77d12464e6eb1d284d421ba7ca13d034665f06707fc3b2746edeb4248fa651ff4179ec275f280881dceb3737fa4971e81411fce7fd431c43eca06dde788f0b8790b1a38b82830b6bd5a8e8208b4a96c896ef008d4c95b252cff56b8de97cddae7dbe9dbcfd228f8edd7569b23f5294a57ea120aca4350a37732025cc1e690728712d0d69ec8c5af800c3b9863ed405d7c76d3a3ca13930c67e521ba4f010f5d22d026d7a086794178b7049cfe8307bbeddc257711aed6f76c792e318ec1d6f48cbdd482f45b9c5fb4a32964a108bd5af813cd9a528d5e210cb8f237c48679ba1d29e249dd13f75a95cd1dab0b73ad1a1d7be2a9e7a68ed284f9eab5756eca1d02904a9087a48a669ea28e08b33078e291829750350f3bf3f0647ed939fa3a95daf7a94b1bd7bbe8dafb410d3ec02c711cc0df8234053f55c30456294a019aadf789c31141654d51323b9d7ee716e8f0179b1079698208bc2fbbbdf36859b6e9630193c0800d0ae6d4071587f1c6c9be6d2635c91cad4051ff8ba3e89ea3fe3cf88123f4e46b3974194350e175b0a708328396b429ae8dc2504fd682c3a3055d341a4521bd14b2e26ebd619a2c595446f2dfb6da9b103226f0b2b2ae7057f1445622998ed8a21e92cbcd9f91b2e3fa5e3ef5aa63f9f209a46b0705b2c0fdeb027f5be3b1135c665fa68ee472698ec03103424f22f5d3d9c039771b5a16720cdd46fe324f0bffe077ac2b811c28b0237f3ae9cc43af853a19a3483e6b29c5f5f0b1e32433ef0373fafc11a167dcd105fa0ea2fd08febabbd7bf2aa0540024fc7e83145dbfd0b7d7d5b9849538a1c3751183f43588ab1823dfac8e6f955f5f93b07d39d15ee81b548d8041762aa4956cfd5f63789bcccb3451d4bf496e8256e6cdd60bf8abbb9d255e20b2ff238d25b28f8e085f93c9162f784e1021386a666920134cbc5edc5a654b1ceed1df476d1f8ebc242329fb0839efe1b5764031fa344c22dcbb76acc4092ffe575dd693a992492e683d63d2294585c4ce2a6178535671611fdc392cbfa189b0a69f69a0015b677942ffadc4a658de34c849238378ebf3013a29efb97f1552773e0409ed2e2dfab97c6543fde2f74cf0da6d1fedffb4a02d0f7cb0af3bd4febcdcacdf63d720ee148f7d76c13d3470b3ee5975ee568b2313f0ecda1ce6055194ccd5bbd7bd4f09fa75be35566f9a6ccfa44a1aa76be087a1ce84bd3d258eb2822a8712c5d8423543049a166e140f44f20f2aa024ef3b37f4f8be846378a40f5d15bc882ebec7f39eb59e3ca0fae2e86276ec392517d3ba1941299109167761a3db8f084f536680bb23c615d0e51684f6cad23a290e5682904ff4a326f5ff1df6f73d6816fbb8a1725895c823fd2608aba23fec7a91d69ada526d11df0bad5ed915af90122f5b98f507d3f5e7aa71f1d98739631ca56e8f71ce64bcc28798b79ba662758cd7bfded2c804b4fffb96160539ec8461de62742d52fb4de60c75b31a806c1ff3d85df3a5c77366b2b8e04005b28f6dcd5ee99049f83080c3379cdb0f9860b2f4be879e756323e2adf6b64ec8b016ec2dd48a86083cc4ba3536e7369850c062dacaeb1b717e122442673f220ac095b0e8cbd9041867487929d21efb669366f7813ad939dae201bd3f2f40633a0d69ccbd2b3d5b17ec656ee488c0ac7cf7bf8dfcaa3957ae4ed9c4a93cf623e00360ee67e313d3ca9c82ae21257296c66cf586df960ba5e608dbb16e5b57d3dd3065bfbefdb99ead6b045165495b46bbaac5bd123d11649339e636380e73eb7efa5e19f67b4f7ed5a156a0504cf59ed0ab6680d03c241aa394e85fc50c677a7d11f6946fc123e2bb8e4eb178f91b946d5300702e042790ec5ab6cd673b924a8144f1d4734a59bf13720090265442a0f6952c3f7f18b652e349a5f5372c05c19348cbf42be0b198d89f42dd51c3492d8cdcca041a5bdf34027d70b29d2c83d800f560ae528f6b082aee2ec1601765fc0ea79ff99819b9fd8395de09b65e52c2e9b019555e1c5dfd3ac7bc1ea34480e5200fb93189fc2527c0c621bbce8ee59050b70256f9ed21db26330c06fa37ff785e771636c6aa1856e854b2e0c2307a64a5f11d2a660acdf0aea48d4f3a126aa4e989c8846e86e158443ba7a54c5831bdcda7d3fad4e5e73aa5cccaff4caf6017c70df29d7d6d0c0aa2abc7278566d1ec59b2e59f8f26beb46aa8481f55b41a5e71aa7a0d902872964b514662be9ef1c746ad4f8b12049f01e3496c85d9049a7b5030d503f3ced34eb6e767f84aa8461c38300838d4dda8282157f6687ccfe3a177f5ce58cbebbf8450ed5442c8f7d95e5769612bd28cdffc96fdbb66cf12dfae686d155476b08300df9e44e17a50676bbe9e156d5871a9f3e5b416a1314329626b5a631e03d5bac3605eaa6a155993599546fbe71604823d64958056f2a5b57de11129dd21d4f8935938574e7e3969fa48e4380f029fbe20be30dddcc2d13bd0f80cf8ae554f44a8e2a051cc7e8a7594b2535685bf9bd1f934a9aa9c2e0cf4bea57d25d0951e4d95898f91742c32d3501b27fc6a808130c6a72559f85d080da8595f39b5258adca4cd4669b67abd97e79ed75a38fb59b710014fa2bbac09e5bd621c6a61c83369323bd97f94845cf00965be4adb8f434db8f01d87b845303726c79eb0d86508f85bcd19b7bb64e44a50b36e9a3e29ffde6b029faecd3bd48c36b167e98f2ffa1dbc474dbb12a2615d60e35a4188aed06f9682e03e7b45ccf16e00dacd94860ed49d3d9ba95ddd4714ccbb374e9efeb56e8352a32c0c2d5e7710366f4b0632e54884aad5582d83868dc66341bf8c6c9ced23718809c765d42568a1d8edc018bc8d31b69c3a942b25a42581116246bab34c7f70aecef510ff6fa5a46b94d071e4c3a2cf5665791b139d4565b7d41fbdc6e963c885869bac1bbb21c7316eb31498d8291b5a161c38c76ca39976899fcff38b7b495a8593c8e5628171676bc8cfeca20b5ba8f4ff03edb7a35546073f47af6e0efef6d8cc43f464b717684bc8388b5de054c7351d2f172c90d9bd2e4fff23cd52f415291d7f8f42bbfb3d6c2a569c8619cc59025d6c3dabc2e3f0e2fb83bf0c0105b3d384273cdcbd91b86e3557722f267dead889139bd9299e0913a2723e3705e523f4262db0f88cb279801a7aae39cf70b6f5f4f3f6bcde89978b2d8302e1ef82564c17306324e6338896363cefadbcb1c6698417dd3fd406b7463641c2a072f5dd4d7bd754880f7fe42f661c6586acde2b08d44ea44904fc9052bae5041228485fbd682ed0818e669f84f5f4b65a42ac2fd3f4c50605f4160f406142c2c99659f936d8fd649854b08214eeef04ac7e2bab27042e4e7a14d4d7ed1b64a1e5d6b50635230c089c6d208b16ac4d9544e78e907af4ff27448fef03c2cc497951f515aebf92152cbf75f0036243dacbd88a995dcba3cb0776d183557667741dbc87696f04ae5751fb1def4e52ab2eece137ea855867d12746426bec93ed88952b2f33f5a32dc95ab2a0c85ed188bb6a8a041f9cef690a6811abeb5ca7aa0a49194c6f1f7431d9703d6e366316ab27a0cf392d3d78fe889dc4084075013516ac7620acf041af41193b30bec45bdc45265fde0eaf3b1ac2fc114346ce731e2b8af8e9500a272632c5c47f6447a695a03d98bd0d907d40eeac96e4c0261bf182d1d9dbcaa5e749c8ea7eb7dd03cf591dd0047032948d51fea18a296612c8cf922b841d1cea9037f38df42e8079b86ef03854b53d1a7f4036a94e021504aac46336f90d7d152c1710aa491bc14dc6e76521a27d5f2bcae85971d058ec79a33247564721e52ef194893d88f848ef2e3654161908305e6e088c1ef55053e67daa5a8cfbe03eb341ac6c45de6daab7a4cc78d6858fe67912d234e5eb8c5de69ed0bc78c", 0x1000, 0x34}, {&(0x7f00000003c0)="ce957770e469062d595616ce06f7543115f295eaa5a23b1c4ed00c1902b554b55c0aeba68b735c2e41b7579553b2a42d949c276ce0a7c2c450202c558dbcb78d3b", 0x41, 0xff}, {&(0x7f0000000440)="5ff1b2ce", 0x4, 0x826}, {&(0x7f0000001900)="b0359b7bda41382ca6d666c58d1209e8b92242a0f1708ce757f134a112bce42fa5d701064b686b10a1d9588e52518d8524825cedeec3c92f0bed3249d7302509d04fa829e20b827b491a9fa9f7acd79a52d4109f12d169e6f1b01bf09aa2ec7fc668604b85cf1d680daf1588236e3d462cd0c231fe303426dc025fa82d849fcce1e65716a01187c25db6a92cb3f9f748a80a9b830c3a0d5cd617d73ee35cadbab3ea60b380ef46bdb9fc03a69ac850356dbd4ec75666f2e97625fceeb1bf317cc449a0fc4326a83225fb1d48d974b5b9c5", 0xd1, 0x7}, {&(0x7f0000000540)="732549c430de25506e9cea332bffdcb0b282b5b222884703be1f17bdfb0ed7764206480e346e5a1b9890477c89b5a4ddaa12d9a8cda67bb4a588c48304b682bd34f7eab72f557513b8bd3d37b1852497d49caff8f377bac5199888ae350c7c9f7c890a3b4702e02286c6f5c01a4b0bc07385568d4db0bcf6e2d8", 0x7a, 0x7ff}, {&(0x7f0000001a00)="b8d614499345b149ad2ebabde6b62ea6adcd9aeaefa90e3e80359e72b4ca393c0fabdcaf0e15d5d3426add721c2e77894fabb3cff29e88db5a8035f1a912a763f060238ace1afbcc0c8eb1ccca71b3854e91fd8382ad6f99e64a9df4d585542f271cff3a6f885dd7965a2ff57678690962301250b581aa2a29bd337bad718dd5c3f1a932b9a5f9be1d4f895df425ee721051983723b8ffc90d8189b7a28e1c6fc07aaf60299749c50642cd4fa50cb9762c773a9cb471af5f4e73dee7bad040fc7f4b08c3ca85b2a2c638596cdec7209d762a8c83b6cb0f5390e9", 0xda, 0x7}], 0x1000020, &(0x7f0000001bc0)={[{@uni_xlateno}, {@fat=@dos1xfloppy}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_winnt}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfsroot}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', r0}}, {@subj_user}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x8c00, 0x50) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2884.213306] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2884.213306] program syz-executor.1 not setting count and/or reply_len properly [ 2884.232899] FAULT_INJECTION: forcing a failure. [ 2884.232899] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2884.235527] CPU: 1 PID: 15164 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2884.237017] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2884.238740] Call Trace: [ 2884.239304] dump_stack+0x107/0x167 [ 2884.240068] should_fail.cold+0x5/0xa [ 2884.240862] copy_page_from_iter+0x40a/0x900 [ 2884.241782] blk_rq_map_user_iov+0x138b/0x1a60 [ 2884.242792] ? blk_rq_unmap_user+0x750/0x750 [ 2884.243839] ? find_held_lock+0x2c/0x110 [ 2884.244686] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2884.245850] ? lock_downgrade+0x6d0/0x6d0 [ 2884.246725] ? import_single_range+0x24d/0x2e0 [ 2884.247684] blk_rq_map_user+0x103/0x170 [ 2884.248559] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2884.249600] ? alloc_pages_current+0x18f/0x280 [ 2884.250576] ? sg_build_indirect.isra.0+0x448/0x710 [ 2884.251622] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2884.252724] ? sg_build_indirect.isra.0+0x710/0x710 [ 2884.253756] ? vprintk_func+0x93/0x140 [ 2884.254669] ? record_print_text.cold+0x16/0x16 [ 2884.255637] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2884.256824] ? trace_hardirqs_on+0x5b/0x180 [ 2884.257817] sg_write.part.0+0x69e/0xaa0 [ 2884.258698] ? sg_new_write.isra.0+0x770/0x770 [ 2884.259674] ? find_held_lock+0x2c/0x110 [ 2884.260535] ? __might_fault+0xd3/0x180 [ 2884.261374] ? lock_downgrade+0x6d0/0x6d0 [ 2884.262260] ? _cond_resched+0x10/0x30 [ 2884.263087] ? inode_security+0x107/0x140 [ 2884.263956] ? avc_policy_seqno+0x9/0x70 [ 2884.264817] ? selinux_file_permission+0x92/0x520 [ 2884.265835] sg_write+0x87/0x120 [ 2884.266571] do_iter_write+0x4f0/0x700 [ 2884.267395] ? import_iovec+0x83/0xb0 [ 2884.268208] vfs_writev+0x1ae/0x620 [ 2884.268986] ? vfs_iter_write+0xa0/0xa0 [ 2884.269832] ? __fget_files+0x2cf/0x520 [ 2884.270765] ? lock_downgrade+0x6d0/0x6d0 [ 2884.271644] ? find_held_lock+0x2c/0x110 [ 2884.272507] ? ksys_write+0x12d/0x260 [ 2884.273317] ? __fget_files+0x2f8/0x520 [ 2884.274166] ? __fget_light+0xea/0x290 [ 2884.275076] do_writev+0x139/0x300 [ 2884.275831] ? vfs_writev+0x620/0x620 [ 2884.276635] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2884.277740] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2884.278923] do_syscall_64+0x33/0x40 [ 2884.279763] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2884.280849] RIP: 0033:0x7f952207fb19 [ 2884.281638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2884.285567] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2884.287205] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2884.288712] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2884.290222] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2884.291751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2884.293269] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:20:42 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x9000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:20:42 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9865, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000003c0)=ANY=[@ANYBLOB="6772706a71756f74613d2e2f66696c65302c7569643efaabd6a90891f84385bf4dec482c6ecd084a0d595017df6256062e7290b3ed7164b00ca612c251874cf89fd71e930f2369a1bd388f27810df22ce235f1d8ce51224b6d3bdef996e10c50f67267a18af1c4c7c1a05a41cf280d9e1872e024e42ef1ff3d2056a82bff61e83ba4450207191c94953e7311d03dbee28cbbbd7712fc62f3b78931c424a090ba4fe59ea2af402b578967c9cf271aa3e8a62d6e358720571f067958", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:20:42 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 53) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:20:42 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x2, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7a000000, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:20:42 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1400, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:20:42 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x1, 0x6, &(0x7f0000001b00)=[{&(0x7f0000001e00)="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", 0x1000, 0x34}, {&(0x7f00000003c0)="ce957770e469062d595616ce06f7543115f295eaa5a23b1c4ed00c1902b554b55c0aeba68b735c2e41b7579553b2a42d949c276ce0a7c2c450202c558dbcb78d3b", 0x41, 0xff}, {&(0x7f0000000440)="5ff1b2ce", 0x4, 0x826}, {&(0x7f0000001900)="b0359b7bda41382ca6d666c58d1209e8b92242a0f1708ce757f134a112bce42fa5d701064b686b10a1d9588e52518d8524825cedeec3c92f0bed3249d7302509d04fa829e20b827b491a9fa9f7acd79a52d4109f12d169e6f1b01bf09aa2ec7fc668604b85cf1d680daf1588236e3d462cd0c231fe303426dc025fa82d849fcce1e65716a01187c25db6a92cb3f9f748a80a9b830c3a0d5cd617d73ee35cadbab3ea60b380ef46bdb9fc03a69ac850356dbd4ec75666f2e97625fceeb1bf317cc449a0fc4326a83225fb1d48d974b5b9c5", 0xd1, 0x7}, {&(0x7f0000000540)="732549c430de25506e9cea332bffdcb0b282b5b222884703be1f17bdfb0ed7764206480e346e5a1b9890477c89b5a4ddaa12d9a8cda67bb4a588c48304b682bd34f7eab72f557513b8bd3d37b1852497d49caff8f377bac5199888ae350c7c9f7c890a3b4702e02286c6f5c01a4b0bc07385568d4db0bcf6e2d8", 0x7a, 0x7ff}, {&(0x7f0000001a00)="b8d614499345b149ad2ebabde6b62ea6adcd9aeaefa90e3e80359e72b4ca393c0fabdcaf0e15d5d3426add721c2e77894fabb3cff29e88db5a8035f1a912a763f060238ace1afbcc0c8eb1ccca71b3854e91fd8382ad6f99e64a9df4d585542f271cff3a6f885dd7965a2ff57678690962301250b581aa2a29bd337bad718dd5c3f1a932b9a5f9be1d4f895df425ee721051983723b8ffc90d8189b7a28e1c6fc07aaf60299749c50642cd4fa50cb9762c773a9cb471af5f4e73dee7bad040fc7f4b08c3ca85b2a2c638596cdec7209d762a8c83b6cb0f5390e9", 0xda, 0x7}], 0x1000020, &(0x7f0000001bc0)={[{@uni_xlateno}, {@fat=@dos1xfloppy}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_winnt}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfsroot}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', r0}}, {@subj_user}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x8c00, 0x50) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000001880)=[{0x0, 0x0, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2901.817768] loop1: detected capacity change from 0 to 33559552 [ 2901.983470] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2901.983470] program syz-executor.1 not setting count and/or reply_len properly [ 2901.987550] FAULT_INJECTION: forcing a failure. [ 2901.987550] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2901.990110] CPU: 1 PID: 15179 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2901.991680] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2901.993501] Call Trace: [ 2901.994078] dump_stack+0x107/0x167 [ 2901.994890] should_fail.cold+0x5/0xa [ 2901.995861] copy_page_from_iter+0x40a/0x900 [ 2901.996849] blk_rq_map_user_iov+0x138b/0x1a60 [ 2901.997880] ? blk_rq_unmap_user+0x750/0x750 [ 2901.998876] ? find_held_lock+0x2c/0x110 [ 2901.999779] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2902.000977] ? lock_downgrade+0x6d0/0x6d0 [ 2902.001923] ? import_single_range+0x24d/0x2e0 [ 2902.002987] blk_rq_map_user+0x103/0x170 [ 2902.003930] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2902.005021] ? alloc_pages_current+0x18f/0x280 [ 2902.006074] ? sg_build_indirect.isra.0+0x448/0x710 [ 2902.007243] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2902.008459] ? sg_build_indirect.isra.0+0x710/0x710 [ 2902.009606] ? vprintk_func+0x93/0x140 [ 2902.010513] ? record_print_text.cold+0x16/0x16 [ 2902.011598] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2902.012760] ? trace_hardirqs_on+0x5b/0x180 [ 2902.013764] sg_write.part.0+0x69e/0xaa0 [ 2902.014717] ? sg_new_write.isra.0+0x770/0x770 [ 2902.015876] ? find_held_lock+0x2c/0x110 [ 2902.016892] ? __might_fault+0xd3/0x180 [ 2902.017875] ? lock_downgrade+0x6d0/0x6d0 [ 2902.018910] ? _cond_resched+0x10/0x30 [ 2902.019827] ? inode_security+0x107/0x140 [ 2902.020847] ? avc_policy_seqno+0x9/0x70 [ 2902.021948] ? selinux_file_permission+0x92/0x520 [ 2902.023192] sg_write+0x87/0x120 [ 2902.024121] do_iter_write+0x4f0/0x700 [ 2902.025059] ? import_iovec+0x83/0xb0 [ 2902.025991] vfs_writev+0x1ae/0x620 [ 2902.026892] ? vfs_iter_write+0xa0/0xa0 [ 2902.027908] ? __fget_files+0x2cf/0x520 [ 2902.028924] ? lock_downgrade+0x6d0/0x6d0 [ 2902.029958] ? find_held_lock+0x2c/0x110 [ 2902.030992] ? ksys_write+0x12d/0x260 [ 2902.031975] ? __fget_files+0x2f8/0x520 [ 2902.033029] ? __fget_light+0xea/0x290 [ 2902.033924] do_writev+0x139/0x300 [ 2902.034728] ? vfs_writev+0x620/0x620 [ 2902.035598] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2902.036772] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2902.037900] do_syscall_64+0x33/0x40 [ 2902.038777] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2902.040044] RIP: 0033:0x7f952207fb19 [ 2902.041002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2902.045555] RSP: 002b:00007f951f5f5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2902.047591] RAX: ffffffffffffffda RBX: 00007f9522192f60 RCX: 00007f952207fb19 [ 2902.049429] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 000000000000000a [ 2902.051282] RBP: 00007f951f5f51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2902.053221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2902.055167] R13: 00007ffd2a29b96f R14: 00007f951f5f5300 R15: 0000000000022000 20:20:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{0x0, 0x0, 0x2}, {0x0, 0x0, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:42 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x1, 0x6, &(0x7f0000001b00)=[{&(0x7f0000001e00)="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", 0x1000, 0x34}, {&(0x7f00000003c0)="ce957770e469062d595616ce06f7543115f295eaa5a23b1c4ed00c1902b554b55c0aeba68b735c2e41b7579553b2a42d949c276ce0a7c2c450202c558dbcb78d3b", 0x41, 0xff}, {&(0x7f0000000440)="5ff1b2ce", 0x4, 0x826}, {&(0x7f0000001900)="b0359b7bda41382ca6d666c58d1209e8b92242a0f1708ce757f134a112bce42fa5d701064b686b10a1d9588e52518d8524825cedeec3c92f0bed3249d7302509d04fa829e20b827b491a9fa9f7acd79a52d4109f12d169e6f1b01bf09aa2ec7fc668604b85cf1d680daf1588236e3d462cd0c231fe303426dc025fa82d849fcce1e65716a01187c25db6a92cb3f9f748a80a9b830c3a0d5cd617d73ee35cadbab3ea60b380ef46bdb9fc03a69ac850356dbd4ec75666f2e97625fceeb1bf317cc449a0fc4326a83225fb1d48d974b5b9c5", 0xd1, 0x7}, {&(0x7f0000000540)="732549c430de25506e9cea332bffdcb0b282b5b222884703be1f17bdfb0ed7764206480e346e5a1b9890477c89b5a4ddaa12d9a8cda67bb4a588c48304b682bd34f7eab72f557513b8bd3d37b1852497d49caff8f377bac5199888ae350c7c9f7c890a3b4702e02286c6f5c01a4b0bc07385568d4db0bcf6e2d8", 0x7a, 0x7ff}, {&(0x7f0000001a00)="b8d614499345b149ad2ebabde6b62ea6adcd9aeaefa90e3e80359e72b4ca393c0fabdcaf0e15d5d3426add721c2e77894fabb3cff29e88db5a8035f1a912a763f060238ace1afbcc0c8eb1ccca71b3854e91fd8382ad6f99e64a9df4d585542f271cff3a6f885dd7965a2ff57678690962301250b581aa2a29bd337bad718dd5c3f1a932b9a5f9be1d4f895df425ee721051983723b8ffc90d8189b7a28e1c6fc07aaf60299749c50642cd4fa50cb9762c773a9cb471af5f4e73dee7bad040fc7f4b08c3ca85b2a2c638596cdec7209d762a8c83b6cb0f5390e9", 0xda, 0x7}], 0x1000020, &(0x7f0000001bc0)={[{@uni_xlateno}, {@fat=@dos1xfloppy}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_winnt}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfsroot}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', r0}}, {@subj_user}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x8c00, 0x50) 20:20:42 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {0x0, 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:42 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x2000, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:20:42 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x218000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f00000007c0)=0xc) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000001900), 0x20000, 0x0) perf_event_open(&(0x7f0000001880)={0x1, 0x80, 0xc6, 0x1, 0x9, 0x5, 0x0, 0x8000, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000840), 0x4}, 0x10002, 0x1, 0x2, 0x5, 0x5, 0xece, 0x9, 0x0, 0x85}, r2, 0xe, r3, 0x8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001d00)=0xc9b9, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x1, 0x5, &(0x7f0000000540)=[{&(0x7f0000001940)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d903b7e40608a43690dcfe332ca50d77a23c7c6b07d4afe5e14d9a85be225abfe069d3118bd401383ecede1ce34da258463cfa9179f41749a6ffe1737cdb499495446d27451dbc783769b8a007cbd0da6aee372674fe838f75642b372d92c2eb00b92787765c2e30fe79373fd971f4d44ee640ea0240f1fc8804d100"/173, 0xad, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783f31e89946dec4f03b6dbb7a4b9a35e7ad740b0000000000000000", 0x1c, 0x42}, {&(0x7f00000003c0)="f281d231b228228cce7c95e9039c160757bb7f0173f197cadf43376106b93445f7712859c8c6cde8e9d7674e352f73a826bb7623c14a0b7a80d996e8b08a953de6c7fb03d66ef086894b995d1ae9d3ee7d0d5f129f508a450923bf4c9859957caa74e6798e23538fd163082ea6cffd0448d3f96ec292712029ffdb6d11837cdd4cdbc4a32a9609eaa0a8d4ffeca0c91012a6988df0c98504155d5d5352e89695e13857ebe08311df1b7ea99e7ad6794a5727e011e616b752da1fca3b6b0b6c73a59aa4ef172661003cdfdab2c27ccd3a6713b3817c93a0341c0cb02a97deaa9ea95b9bcdc39f4bc3c73ccfd7e28381a5d61d338e93", 0xf5, 0x7}, {&(0x7f00000001c0)="16396f40", 0x4, 0x9}], 0xa18000, &(0x7f0000000340)=ANY=[@ANYBLOB="6772706a71756f74613d2e2f66696c65302c7065726d69745f646972651174696f2c00"]) openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0xa4000, 0x80) 20:20:56 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{0x0}, {0x0, 0x0, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x8cffffff, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:20:56 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x1, 0x6, &(0x7f0000001b00)=[{&(0x7f0000001e00)="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", 0x1000, 0x34}, {&(0x7f00000003c0)="ce957770e469062d595616ce06f7543115f295eaa5a23b1c4ed00c1902b554b55c0aeba68b735c2e41b7579553b2a42d949c276ce0a7c2c450202c558dbcb78d3b", 0x41, 0xff}, {&(0x7f0000000440)="5ff1b2ce", 0x4, 0x826}, {&(0x7f0000001900)="b0359b7bda41382ca6d666c58d1209e8b92242a0f1708ce757f134a112bce42fa5d701064b686b10a1d9588e52518d8524825cedeec3c92f0bed3249d7302509d04fa829e20b827b491a9fa9f7acd79a52d4109f12d169e6f1b01bf09aa2ec7fc668604b85cf1d680daf1588236e3d462cd0c231fe303426dc025fa82d849fcce1e65716a01187c25db6a92cb3f9f748a80a9b830c3a0d5cd617d73ee35cadbab3ea60b380ef46bdb9fc03a69ac850356dbd4ec75666f2e97625fceeb1bf317cc449a0fc4326a83225fb1d48d974b5b9c5", 0xd1, 0x7}, {&(0x7f0000000540)="732549c430de25506e9cea332bffdcb0b282b5b222884703be1f17bdfb0ed7764206480e346e5a1b9890477c89b5a4ddaa12d9a8cda67bb4a588c48304b682bd34f7eab72f557513b8bd3d37b1852497d49caff8f377bac5199888ae350c7c9f7c890a3b4702e02286c6f5c01a4b0bc07385568d4db0bcf6e2d8", 0x7a, 0x7ff}, {&(0x7f0000001a00)="b8d614499345b149ad2ebabde6b62ea6adcd9aeaefa90e3e80359e72b4ca393c0fabdcaf0e15d5d3426add721c2e77894fabb3cff29e88db5a8035f1a912a763f060238ace1afbcc0c8eb1ccca71b3854e91fd8382ad6f99e64a9df4d585542f271cff3a6f885dd7965a2ff57678690962301250b581aa2a29bd337bad718dd5c3f1a932b9a5f9be1d4f895df425ee721051983723b8ffc90d8189b7a28e1c6fc07aaf60299749c50642cd4fa50cb9762c773a9cb471af5f4e73dee7bad040fc7f4b08c3ca85b2a2c638596cdec7209d762a8c83b6cb0f5390e9", 0xda, 0x7}], 0x1000020, &(0x7f0000001bc0)={[{@uni_xlateno}, {@fat=@dos1xfloppy}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_winnt}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfsroot}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', r0}}, {@subj_user}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) 20:20:56 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x4000, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:20:56 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {0x0, 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:56 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18020, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@permit_directio}]}) 20:20:56 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0xe000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:20:56 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 54) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 2916.201247] loop1: detected capacity change from 0 to 33559552 [ 2916.256659] blktrace: Concurrent blktraces are not allowed on loop14 [ 2916.290385] proc: Unknown parameter 'grpjquota' 20:20:56 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x1, 0x6, &(0x7f0000001b00)=[{&(0x7f0000001e00)="640ba47dcbed372b12812b5b33e9519c221fc2704999a8a1eead93af650e294a3863b78df5a9582e5c6252c1404ee120c4d5419e8fe0ad72f084427c83ee7619efb5550b7163595875434e04018f6435959b202ad6ba9232ee86619c154938307c177f6d1460dcae6da8c8308ead6b603b532afbf6420d80054a7bd3f08380bac8c6691af923afa66b83da66fd22f79f0380126ea8f94559996348f4c725e3d3028ba765b6aa78e4c0818296cafcee4884698efcd49436739dc887a0e7a84bcb94311b9d24a616b0b685484cc4942ea1ae72e27e20d12f60b8913edca3f58bcf57438dfb66815bcbe60835c86897732c2c732d8e358e32ee63af9b996b1793dd1fad2602cd7878eb09e834b9158f28c03619c354c25ff76deb6b521ced7e996e3e5d4637fb54c53a5be224068954fc1a97127b4b5bca90bea5e7e72d40834131a4f39eb83347951a377eaa18d453ebf45c0a94a2c09da97aabdf54c6f09e86d5a214ee0bd988580488b884bf6e706de58041ffab743ac8aba87ddb1154b420ec3644d12056d0d50b5fc93e9b49f10f5945468efc51a80f6dd6319859046f1b8f0eed3636a70349fedbf67d74ab42cb6f766a627a5695224f4859b7dd2060587141294c1d906c2c71c31d649e46c864cc5961294d199b57b02043fc38d6bb2da9267adbdcd3f9c6b1393fc3442d498912d435d48a2bdf83cd57d9bae1eedc626d54da418c603bc9ec9507f256fb6a8dc3a06c259f2c3cdd610f465e064871d6427b9079054d00160db253d46e53ea60ee64d982380b0e3c8cb455b7aa9134e9cb137b6b8dc2113e52048f82222fa31860b32bc314623bab73a0f1185233f9ce500001885f90f8c8bcfbd63b87af413aa8f4648537a4812a46b11b68eace97bba64838cef554cd68240efa3e1c5f36d4e4c278e360010443c590a146c18ac00aff0e9b510060ab0184b1243599e869a5b02b2e180df03a3537853d9392bde3734887f5d777db33448ff81089468b8bc194c56b24425f9eed31bb3ff05422c6822c92c37c2370c941c234faaaf95bcd5a312938e884d61953601582348a6a101c8b9d7c9a8a34a3c3444fd96f85dddc24e6d7e2d7152196af67b41ca7daff473521f5bc0a4a4543ed93e75893229a761285b45e0f9ad77c60ce9ff1307864dfbab732f1d4e8b966da2395e91d20420460163e4009a11bf400a2029f29ee3ac380380eda2e918cda27b45cd5ab2ee25bba0569c4564bbf8865b4274ef2280549b079063b9c808c6abb8529d622f13ecbb152b9c4832abfe48b0e0cf5287f9fa16879d7613016a7971e7a443bba1a1575b56709a33e129d0a25ad6405ea26376e3f47c51939f196493ebdf009fc01022bc8f38987a04bb1a3deec0dd322defaab77f8d8968c7b1335aa4cfbfada3a46311fc77321bfcdcb7f3618f3cc54af68765d681f606e908720172f5692f7dfcc368093f500f6f12056f30c9e07b78fe6364d650f24ff68824d07738419bbeea263138e831e0923e59df30dd6e39069ddc81f3800903ae3949d2e9a0e62365dc1edf18eec067cffc83d3431fc4fca0cfca472b4f180cd69dde5e095aaf5f52458c78721a433795ace6a3b37fbbadbf39fb99d3696e3caa34bd5961807fbbc4612663715538874a78fc8f770dae081b4252896c5cd2551463cfe37909d8f175823b8021ba49b759352530bbf6c5d8dee14e3c6b6689202ce0b66c621839f8c9a68721633ac4a51de73c090efd958f3cb98bed2112b577cf4191ac8ede74bf08214ce8f3a70bbf68d7f56fb3aee42bc64fb50302e63c4212078cd04e83d29663c180e278897376e5fcabc589d6ce925b5c23f7e0788cd77d12464e6eb1d284d421ba7ca13d034665f06707fc3b2746edeb4248fa651ff4179ec275f280881dceb3737fa4971e81411fce7fd431c43eca06dde788f0b8790b1a38b82830b6bd5a8e8208b4a96c896ef008d4c95b252cff56b8de97cddae7dbe9dbcfd228f8edd7569b23f5294a57ea120aca4350a37732025cc1e690728712d0d69ec8c5af800c3b9863ed405d7c76d3a3ca13930c67e521ba4f010f5d22d026d7a086794178b7049cfe8307bbeddc257711aed6f76c792e318ec1d6f48cbdd482f45b9c5fb4a32964a108bd5af813cd9a528d5e210cb8f237c48679ba1d29e249dd13f75a95cd1dab0b73ad1a1d7be2a9e7a68ed284f9eab5756eca1d02904a9087a48a669ea28e08b33078e291829750350f3bf3f0647ed939fa3a95daf7a94b1bd7bbe8dafb410d3ec02c711cc0df8234053f55c30456294a019aadf789c31141654d51323b9d7ee716e8f0179b1079698208bc2fbbbdf36859b6e9630193c0800d0ae6d4071587f1c6c9be6d2635c91cad4051ff8ba3e89ea3fe3cf88123f4e46b3974194350e175b0a708328396b429ae8dc2504fd682c3a3055d341a4521bd14b2e26ebd619a2c595446f2dfb6da9b103226f0b2b2ae7057f1445622998ed8a21e92cbcd9f91b2e3fa5e3ef5aa63f9f209a46b0705b2c0fdeb027f5be3b1135c665fa68ee472698ec03103424f22f5d3d9c039771b5a16720cdd46fe324f0bffe077ac2b811c28b0237f3ae9cc43af853a19a3483e6b29c5f5f0b1e32433ef0373fafc11a167dcd105fa0ea2fd08febabbd7bf2aa0540024fc7e83145dbfd0b7d7d5b9849538a1c3751183f43588ab1823dfac8e6f955f5f93b07d39d15ee81b548d8041762aa4956cfd5f63789bcccb3451d4bf496e8256e6cdd60bf8abbb9d255e20b2ff238d25b28f8e085f93c9162f784e1021386a666920134cbc5edc5a654b1ceed1df476d1f8ebc242329fb0839efe1b5764031fa344c22dcbb76acc4092ffe575dd693a992492e683d63d2294585c4ce2a6178535671611fdc392cbfa189b0a69f69a0015b677942ffadc4a658de34c849238378ebf3013a29efb97f1552773e0409ed2e2dfab97c6543fde2f74cf0da6d1fedffb4a02d0f7cb0af3bd4febcdcacdf63d720ee148f7d76c13d3470b3ee5975ee568b2313f0ecda1ce6055194ccd5bbd7bd4f09fa75be35566f9a6ccfa44a1aa76be087a1ce84bd3d258eb2822a8712c5d8423543049a166e140f44f20f2aa024ef3b37f4f8be846378a40f5d15bc882ebec7f39eb59e3ca0fae2e86276ec392517d3ba1941299109167761a3db8f084f536680bb23c615d0e51684f6cad23a290e5682904ff4a326f5ff1df6f73d6816fbb8a1725895c823fd2608aba23fec7a91d69ada526d11df0bad5ed915af90122f5b98f507d3f5e7aa71f1d98739631ca56e8f71ce64bcc28798b79ba662758cd7bfded2c804b4fffb96160539ec8461de62742d52fb4de60c75b31a806c1ff3d85df3a5c77366b2b8e04005b28f6dcd5ee99049f83080c3379cdb0f9860b2f4be879e756323e2adf6b64ec8b016ec2dd48a86083cc4ba3536e7369850c062dacaeb1b717e122442673f220ac095b0e8cbd9041867487929d21efb669366f7813ad939dae201bd3f2f40633a0d69ccbd2b3d5b17ec656ee488c0ac7cf7bf8dfcaa3957ae4ed9c4a93cf623e00360ee67e313d3ca9c82ae21257296c66cf586df960ba5e608dbb16e5b57d3dd3065bfbefdb99ead6b045165495b46bbaac5bd123d11649339e636380e73eb7efa5e19f67b4f7ed5a156a0504cf59ed0ab6680d03c241aa394e85fc50c677a7d11f6946fc123e2bb8e4eb178f91b946d5300702e042790ec5ab6cd673b924a8144f1d4734a59bf13720090265442a0f6952c3f7f18b652e349a5f5372c05c19348cbf42be0b198d89f42dd51c3492d8cdcca041a5bdf34027d70b29d2c83d800f560ae528f6b082aee2ec1601765fc0ea79ff99819b9fd8395de09b65e52c2e9b019555e1c5dfd3ac7bc1ea34480e5200fb93189fc2527c0c621bbce8ee59050b70256f9ed21db26330c06fa37ff785e771636c6aa1856e854b2e0c2307a64a5f11d2a660acdf0aea48d4f3a126aa4e989c8846e86e158443ba7a54c5831bdcda7d3fad4e5e73aa5cccaff4caf6017c70df29d7d6d0c0aa2abc7278566d1ec59b2e59f8f26beb46aa8481f55b41a5e71aa7a0d902872964b514662be9ef1c746ad4f8b12049f01e3496c85d9049a7b5030d503f3ced34eb6e767f84aa8461c38300838d4dda8282157f6687ccfe3a177f5ce58cbebbf8450ed5442c8f7d95e5769612bd28cdffc96fdbb66cf12dfae686d155476b08300df9e44e17a50676bbe9e156d5871a9f3e5b416a1314329626b5a631e03d5bac3605eaa6a155993599546fbe71604823d64958056f2a5b57de11129dd21d4f8935938574e7e3969fa48e4380f029fbe20be30dddcc2d13bd0f80cf8ae554f44a8e2a051cc7e8a7594b2535685bf9bd1f934a9aa9c2e0cf4bea57d25d0951e4d95898f91742c32d3501b27fc6a808130c6a72559f85d080da8595f39b5258adca4cd4669b67abd97e79ed75a38fb59b710014fa2bbac09e5bd621c6a61c83369323bd97f94845cf00965be4adb8f434db8f01d87b845303726c79eb0d86508f85bcd19b7bb64e44a50b36e9a3e29ffde6b029faecd3bd48c36b167e98f2ffa1dbc474dbb12a2615d60e35a4188aed06f9682e03e7b45ccf16e00dacd94860ed49d3d9ba95ddd4714ccbb374e9efeb56e8352a32c0c2d5e7710366f4b0632e54884aad5582d83868dc66341bf8c6c9ced23718809c765d42568a1d8edc018bc8d31b69c3a942b25a42581116246bab34c7f70aecef510ff6fa5a46b94d071e4c3a2cf5665791b139d4565b7d41fbdc6e963c885869bac1bbb21c7316eb31498d8291b5a161c38c76ca39976899fcff38b7b495a8593c8e5628171676bc8cfeca20b5ba8f4ff03edb7a35546073f47af6e0efef6d8cc43f464b717684bc8388b5de054c7351d2f172c90d9bd2e4fff23cd52f415291d7f8f42bbfb3d6c2a569c8619cc59025d6c3dabc2e3f0e2fb83bf0c0105b3d384273cdcbd91b86e3557722f267dead889139bd9299e0913a2723e3705e523f4262db0f88cb279801a7aae39cf70b6f5f4f3f6bcde89978b2d8302e1ef82564c17306324e6338896363cefadbcb1c6698417dd3fd406b7463641c2a072f5dd4d7bd754880f7fe42f661c6586acde2b08d44ea44904fc9052bae5041228485fbd682ed0818e669f84f5f4b65a42ac2fd3f4c50605f4160f406142c2c99659f936d8fd649854b08214eeef04ac7e2bab27042e4e7a14d4d7ed1b64a1e5d6b50635230c089c6d208b16ac4d9544e78e907af4ff27448fef03c2cc497951f515aebf92152cbf75f0036243dacbd88a995dcba3cb0776d183557667741dbc87696f04ae5751fb1def4e52ab2eece137ea855867d12746426bec93ed88952b2f33f5a32dc95ab2a0c85ed188bb6a8a041f9cef690a6811abeb5ca7aa0a49194c6f1f7431d9703d6e366316ab27a0cf392d3d78fe889dc4084075013516ac7620acf041af41193b30bec45bdc45265fde0eaf3b1ac2fc114346ce731e2b8af8e9500a272632c5c47f6447a695a03d98bd0d907d40eeac96e4c0261bf182d1d9dbcaa5e749c8ea7eb7dd03cf591dd0047032948d51fea18a296612c8cf922b841d1cea9037f38df42e8079b86ef03854b53d1a7f4036a94e021504aac46336f90d7d152c1710aa491bc14dc6e76521a27d5f2bcae85971d058ec79a33247564721e52ef194893d88f848ef2e3654161908305e6e088c1ef55053e67daa5a8cfbe03eb341ac6c45de6daab7a4cc78d6858fe67912d234e5eb8c5de69ed0bc78c", 0x1000, 0x34}, {&(0x7f00000003c0)="ce957770e469062d595616ce06f7543115f295eaa5a23b1c4ed00c1902b554b55c0aeba68b735c2e41b7579553b2a42d949c276ce0a7c2c450202c558dbcb78d3b", 0x41, 0xff}, {&(0x7f0000000440)="5ff1b2ce", 0x4, 0x826}, {&(0x7f0000001900)="b0359b7bda41382ca6d666c58d1209e8b92242a0f1708ce757f134a112bce42fa5d701064b686b10a1d9588e52518d8524825cedeec3c92f0bed3249d7302509d04fa829e20b827b491a9fa9f7acd79a52d4109f12d169e6f1b01bf09aa2ec7fc668604b85cf1d680daf1588236e3d462cd0c231fe303426dc025fa82d849fcce1e65716a01187c25db6a92cb3f9f748a80a9b830c3a0d5cd617d73ee35cadbab3ea60b380ef46bdb9fc03a69ac850356dbd4ec75666f2e97625fceeb1bf317cc449a0fc4326a83225fb1d48d974b5b9c5", 0xd1, 0x7}, {&(0x7f0000000540)="732549c430de25506e9cea332bffdcb0b282b5b222884703be1f17bdfb0ed7764206480e346e5a1b9890477c89b5a4ddaa12d9a8cda67bb4a588c48304b682bd34f7eab72f557513b8bd3d37b1852497d49caff8f377bac5199888ae350c7c9f7c890a3b4702e02286c6f5c01a4b0bc07385568d4db0bcf6e2d8", 0x7a, 0x7ff}, {&(0x7f0000001a00)="b8d614499345b149ad2ebabde6b62ea6adcd9aeaefa90e3e80359e72b4ca393c0fabdcaf0e15d5d3426add721c2e77894fabb3cff29e88db5a8035f1a912a763f060238ace1afbcc0c8eb1ccca71b3854e91fd8382ad6f99e64a9df4d585542f271cff3a6f885dd7965a2ff57678690962301250b581aa2a29bd337bad718dd5c3f1a932b9a5f9be1d4f895df425ee721051983723b8ffc90d8189b7a28e1c6fc07aaf60299749c50642cd4fa50cb9762c773a9cb471af5f4e73dee7bad040fc7f4b08c3ca85b2a2c638596cdec7209d762a8c83b6cb0f5390e9", 0xda, 0x7}], 0x1000020, &(0x7f0000001bc0)={[{@uni_xlateno}, {@fat=@dos1xfloppy}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_winnt}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfsroot}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', r0}}, {@subj_user}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 2916.353113] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2916.353113] program syz-executor.1 not setting count and/or reply_len properly 20:20:56 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = gettid() r3 = gettid() kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x80, 0x3f, 0x9, 0x6, 0x0, 0x8, 0x20, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x8000ffc8, 0x574}, 0x841, 0x1, 0x100, 0x0, 0x7ff, 0x10001, 0x200, 0x0, 0x101, 0x0, 0x80}, r3, 0x7, r0, 0xb) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000800)=ANY=[@ANYBLOB="7ffcd2bac76e376a7b249973bc387595bfa2f7d50a8adff3b3cb8a844b628e88e80e07ce159d6e1ad3f191bf8c8af604366a30938ab29af518d76a4dc5f84d644591e976d708c56d8715d8"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(r1, 0x9) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)=ANY=[@ANYBLOB="2f66ff0765302c750000000800"/22, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f00000001c0)='proc\x00', &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff) 20:20:56 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{0x0}, {0x0, 0x0, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2916.412841] FAULT_INJECTION: forcing a failure. [ 2916.412841] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2916.415344] CPU: 1 PID: 15256 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2916.416800] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2916.418534] Call Trace: [ 2916.419103] dump_stack+0x107/0x167 [ 2916.419874] should_fail.cold+0x5/0xa [ 2916.420683] copy_page_from_iter+0x40a/0x900 [ 2916.421627] blk_rq_map_user_iov+0x138b/0x1a60 [ 2916.422613] ? blk_rq_unmap_user+0x750/0x750 [ 2916.423574] ? find_held_lock+0x2c/0x110 [ 2916.424432] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2916.425543] ? lock_downgrade+0x6d0/0x6d0 [ 2916.426406] ? import_single_range+0x24d/0x2e0 [ 2916.427385] blk_rq_map_user+0x103/0x170 [ 2916.428241] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2916.429237] ? alloc_pages_current+0x18f/0x280 [ 2916.430196] ? sg_build_indirect.isra.0+0x448/0x710 [ 2916.431260] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2916.432362] ? sg_build_indirect.isra.0+0x710/0x710 [ 2916.433402] ? vprintk_func+0x93/0x140 [ 2916.434223] ? record_print_text.cold+0x16/0x16 [ 2916.435213] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2916.436272] ? trace_hardirqs_on+0x5b/0x180 [ 2916.437194] sg_write.part.0+0x69e/0xaa0 [ 2916.438048] ? sg_new_write.isra.0+0x770/0x770 [ 2916.439018] ? find_held_lock+0x2c/0x110 [ 2916.439874] ? __might_fault+0xd3/0x180 [ 2916.440703] ? lock_downgrade+0x6d0/0x6d0 [ 2916.441596] ? _cond_resched+0x10/0x30 [ 2916.442409] ? inode_security+0x107/0x140 [ 2916.443292] ? avc_policy_seqno+0x9/0x70 [ 2916.444141] ? selinux_file_permission+0x92/0x520 [ 2916.445159] sg_write+0x87/0x120 [ 2916.445875] do_iter_write+0x4f0/0x700 [ 2916.446699] ? import_iovec+0x83/0xb0 [ 2916.447509] vfs_writev+0x1ae/0x620 [ 2916.448276] ? vfs_iter_write+0xa0/0xa0 [ 2916.449109] ? __fget_files+0x2cf/0x520 [ 2916.449941] ? lock_downgrade+0x6d0/0x6d0 [ 2916.450810] ? find_held_lock+0x2c/0x110 [ 2916.451672] ? ksys_write+0x12d/0x260 [ 2916.452474] ? __fget_files+0x2f8/0x520 [ 2916.453313] ? __fget_light+0xea/0x290 [ 2916.454137] do_writev+0x139/0x300 [ 2916.454891] ? vfs_writev+0x620/0x620 [ 2916.455691] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2916.456793] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2916.457870] do_syscall_64+0x33/0x40 [ 2916.458651] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2916.459731] RIP: 0033:0x7f952207fb19 [ 2916.460509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2916.464379] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2916.465970] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2916.467470] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2916.468963] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2916.470457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2916.471954] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:20:56 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {0x0, 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:57 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:57 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{0x0}, {0x0, 0x0, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:20:57 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x1, 0x6, &(0x7f0000001b00)=[{&(0x7f0000001e00)="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", 0x1000, 0x34}, {&(0x7f00000003c0)="ce957770e469062d595616ce06f7543115f295eaa5a23b1c4ed00c1902b554b55c0aeba68b735c2e41b7579553b2a42d949c276ce0a7c2c450202c558dbcb78d3b", 0x41, 0xff}, {&(0x7f0000000440)="5ff1b2ce", 0x4, 0x826}, {&(0x7f0000001900)="b0359b7bda41382ca6d666c58d1209e8b92242a0f1708ce757f134a112bce42fa5d701064b686b10a1d9588e52518d8524825cedeec3c92f0bed3249d7302509d04fa829e20b827b491a9fa9f7acd79a52d4109f12d169e6f1b01bf09aa2ec7fc668604b85cf1d680daf1588236e3d462cd0c231fe303426dc025fa82d849fcce1e65716a01187c25db6a92cb3f9f748a80a9b830c3a0d5cd617d73ee35cadbab3ea60b380ef46bdb9fc03a69ac850356dbd4ec75666f2e97625fceeb1bf317cc449a0fc4326a83225fb1d48d974b5b9c5", 0xd1, 0x7}, {&(0x7f0000000540)="732549c430de25506e9cea332bffdcb0b282b5b222884703be1f17bdfb0ed7764206480e346e5a1b9890477c89b5a4ddaa12d9a8cda67bb4a588c48304b682bd34f7eab72f557513b8bd3d37b1852497d49caff8f377bac5199888ae350c7c9f7c890a3b4702e02286c6f5c01a4b0bc07385568d4db0bcf6e2d8", 0x7a, 0x7ff}, {&(0x7f0000001a00)="b8d614499345b149ad2ebabde6b62ea6adcd9aeaefa90e3e80359e72b4ca393c0fabdcaf0e15d5d3426add721c2e77894fabb3cff29e88db5a8035f1a912a763f060238ace1afbcc0c8eb1ccca71b3854e91fd8382ad6f99e64a9df4d585542f271cff3a6f885dd7965a2ff57678690962301250b581aa2a29bd337bad718dd5c3f1a932b9a5f9be1d4f895df425ee721051983723b8ffc90d8189b7a28e1c6fc07aaf60299749c50642cd4fa50cb9762c773a9cb471af5f4e73dee7bad040fc7f4b08c3ca85b2a2c638596cdec7209d762a8c83b6cb0f5390e9", 0xda, 0x7}], 0x1000020, &(0x7f0000001bc0)={[{@uni_xlateno}, {@fat=@dos1xfloppy}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_winnt}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfsroot}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', r0}}, {@subj_user}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 20:20:57 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 55) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:20:57 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x910b, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2916.784324] loop1: detected capacity change from 0 to 33559552 [ 2916.812259] blktrace: Concurrent blktraces are not allowed on loop14 [ 2916.865475] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2916.865475] program syz-executor.1 not setting count and/or reply_len properly [ 2916.875772] FAULT_INJECTION: forcing a failure. [ 2916.875772] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2916.878221] CPU: 1 PID: 15293 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2916.879685] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2916.881445] Call Trace: [ 2916.882014] dump_stack+0x107/0x167 [ 2916.882791] should_fail.cold+0x5/0xa [ 2916.883612] copy_page_from_iter+0x40a/0x900 [ 2916.884553] blk_rq_map_user_iov+0x138b/0x1a60 [ 2916.885534] ? blk_rq_unmap_user+0x750/0x750 [ 2916.886474] ? find_held_lock+0x2c/0x110 [ 2916.887341] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2916.888467] ? lock_downgrade+0x6d0/0x6d0 [ 2916.889336] ? import_single_range+0x24d/0x2e0 [ 2916.890302] blk_rq_map_user+0x103/0x170 [ 2916.891164] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2916.892171] ? alloc_pages_current+0x18f/0x280 [ 2916.893137] ? sg_build_indirect.isra.0+0x448/0x710 [ 2916.894194] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2916.895325] ? sg_build_indirect.isra.0+0x710/0x710 [ 2916.896369] ? vprintk_func+0x93/0x140 [ 2916.897197] ? record_print_text.cold+0x16/0x16 [ 2916.898181] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2916.899253] ? trace_hardirqs_on+0x5b/0x180 [ 2916.900174] sg_write.part.0+0x69e/0xaa0 [ 2916.901035] ? sg_new_write.isra.0+0x770/0x770 [ 2916.901998] ? find_held_lock+0x2c/0x110 [ 2916.902866] ? __might_fault+0xd3/0x180 [ 2916.903706] ? lock_downgrade+0x6d0/0x6d0 [ 2916.904598] ? _cond_resched+0x10/0x30 [ 2916.905416] ? inode_security+0x107/0x140 [ 2916.906290] ? avc_policy_seqno+0x9/0x70 [ 2916.907148] ? selinux_file_permission+0x92/0x520 [ 2916.908170] sg_write+0x87/0x120 [ 2916.908891] do_iter_write+0x4f0/0x700 [ 2916.909718] ? import_iovec+0x83/0xb0 [ 2916.910524] vfs_writev+0x1ae/0x620 [ 2916.911306] ? vfs_iter_write+0xa0/0xa0 [ 2916.912147] ? __fget_files+0x2cf/0x520 [ 2916.912983] ? lock_downgrade+0x6d0/0x6d0 [ 2916.913849] ? find_held_lock+0x2c/0x110 [ 2916.914708] ? ksys_write+0x12d/0x260 [ 2916.915521] ? __fget_files+0x2f8/0x520 [ 2916.916368] ? __fget_light+0xea/0x290 [ 2916.917187] do_writev+0x139/0x300 [ 2916.917940] ? vfs_writev+0x620/0x620 [ 2916.918758] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2916.919874] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2916.920964] do_syscall_64+0x33/0x40 [ 2916.921754] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2916.922838] RIP: 0033:0x7f952207fb19 [ 2916.923624] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2916.927506] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2916.929107] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2916.930602] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2916.932103] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2916.933595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2916.935096] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:21:11 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:21:11 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 56) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:21:11 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x1, 0x6, &(0x7f0000001b00)=[{&(0x7f0000001e00)="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", 0x1000, 0x34}, {&(0x7f00000003c0)="ce957770e469062d595616ce06f7543115f295eaa5a23b1c4ed00c1902b554b55c0aeba68b735c2e41b7579553b2a42d949c276ce0a7c2c450202c558dbcb78d3b", 0x41, 0xff}, {&(0x7f0000000440)="5ff1b2ce", 0x4, 0x826}, {&(0x7f0000001900)="b0359b7bda41382ca6d666c58d1209e8b92242a0f1708ce757f134a112bce42fa5d701064b686b10a1d9588e52518d8524825cedeec3c92f0bed3249d7302509d04fa829e20b827b491a9fa9f7acd79a52d4109f12d169e6f1b01bf09aa2ec7fc668604b85cf1d680daf1588236e3d462cd0c231fe303426dc025fa82d849fcce1e65716a01187c25db6a92cb3f9f748a80a9b830c3a0d5cd617d73ee35cadbab3ea60b380ef46bdb9fc03a69ac850356dbd4ec75666f2e97625fceeb1bf317cc449a0fc4326a83225fb1d48d974b5b9c5", 0xd1, 0x7}, {&(0x7f0000000540)="732549c430de25506e9cea332bffdcb0b282b5b222884703be1f17bdfb0ed7764206480e346e5a1b9890477c89b5a4ddaa12d9a8cda67bb4a588c48304b682bd34f7eab72f557513b8bd3d37b1852497d49caff8f377bac5199888ae350c7c9f7c890a3b4702e02286c6f5c01a4b0bc07385568d4db0bcf6e2d8", 0x7a, 0x7ff}, {&(0x7f0000001a00)="b8d614499345b149ad2ebabde6b62ea6adcd9aeaefa90e3e80359e72b4ca393c0fabdcaf0e15d5d3426add721c2e77894fabb3cff29e88db5a8035f1a912a763f060238ace1afbcc0c8eb1ccca71b3854e91fd8382ad6f99e64a9df4d585542f271cff3a6f885dd7965a2ff57678690962301250b581aa2a29bd337bad718dd5c3f1a932b9a5f9be1d4f895df425ee721051983723b8ffc90d8189b7a28e1c6fc07aaf60299749c50642cd4fa50cb9762c773a9cb471af5f4e73dee7bad040fc7f4b08c3ca85b2a2c638596cdec7209d762a8c83b6cb0f5390e9", 0xda, 0x7}], 0x1000020, &(0x7f0000001bc0)={[{@uni_xlateno}, {@fat=@dos1xfloppy}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_winnt}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfsroot}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', r0}}, {@subj_user}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 20:21:11 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{0x0, 0x0, 0x2}, {0x0, 0x0, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0x0, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:21:11 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(r0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) mount(&(0x7f00000002c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000440)='./file0\x00', &(0x7f00000003c0)='rootfs\x00', 0x108000, &(0x7f0000000400)='proc\x00') syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:21:11 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x10000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:21:11 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xba00, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:21:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x97ffffff, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) [ 2931.449191] loop1: detected capacity change from 0 to 33559552 [ 2931.452950] blktrace: Concurrent blktraces are not allowed on loop14 [ 2931.550944] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2931.550944] program syz-executor.1 not setting count and/or reply_len properly [ 2931.568533] FAULT_INJECTION: forcing a failure. [ 2931.568533] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2931.571174] CPU: 0 PID: 15322 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2931.572897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2931.574959] Call Trace: [ 2931.575704] dump_stack+0x107/0x167 [ 2931.576677] should_fail.cold+0x5/0xa [ 2931.577691] copy_page_from_iter+0x40a/0x900 [ 2931.578829] blk_rq_map_user_iov+0x138b/0x1a60 [ 2931.580017] ? blk_rq_unmap_user+0x750/0x750 [ 2931.581181] ? find_held_lock+0x2c/0x110 [ 2931.582206] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2931.583528] ? lock_downgrade+0x6d0/0x6d0 [ 2931.584447] ? import_single_range+0x24d/0x2e0 [ 2931.585445] blk_rq_map_user+0x103/0x170 [ 2931.586462] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2931.587527] ? alloc_pages_current+0x18f/0x280 [ 2931.588683] ? sg_build_indirect.isra.0+0x448/0x710 [ 2931.589791] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2931.590978] ? sg_build_indirect.isra.0+0x710/0x710 [ 2931.592098] ? vprintk_func+0x93/0x140 [ 2931.593065] ? record_print_text.cold+0x16/0x16 [ 2931.594083] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2931.595339] ? trace_hardirqs_on+0x5b/0x180 [ 2931.596307] sg_write.part.0+0x69e/0xaa0 [ 2931.597199] ? sg_new_write.isra.0+0x770/0x770 [ 2931.598342] ? find_held_lock+0x2c/0x110 [ 2931.599254] ? __might_fault+0xd3/0x180 [ 2931.600129] ? lock_downgrade+0x6d0/0x6d0 [ 2931.601059] ? _cond_resched+0x10/0x30 [ 2931.602021] ? inode_security+0x107/0x140 [ 2931.602950] ? avc_policy_seqno+0x9/0x70 [ 2931.604010] ? selinux_file_permission+0x92/0x520 [ 2931.605269] sg_write+0x87/0x120 [ 2931.606151] do_iter_write+0x4f0/0x700 [ 2931.607171] ? import_iovec+0x83/0xb0 [ 2931.608128] vfs_writev+0x1ae/0x620 [ 2931.608931] ? vfs_iter_write+0xa0/0xa0 [ 2931.609945] ? __fget_files+0x2cf/0x520 [ 2931.610881] ? lock_downgrade+0x6d0/0x6d0 [ 2931.611825] ? find_held_lock+0x2c/0x110 [ 2931.612666] ? ksys_write+0x12d/0x260 [ 2931.613442] ? __fget_files+0x2f8/0x520 [ 2931.614252] ? __fget_light+0xea/0x290 [ 2931.615124] do_writev+0x139/0x300 [ 2931.615997] ? vfs_writev+0x620/0x620 [ 2931.616911] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2931.618120] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2931.619298] do_syscall_64+0x33/0x40 [ 2931.620147] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2931.621342] RIP: 0033:0x7f952207fb19 [ 2931.622201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2931.626797] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2931.628688] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2931.630448] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2931.632223] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2931.633945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2931.635711] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:21:12 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x1, 0x6, &(0x7f0000001b00)=[{&(0x7f0000001e00)="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", 0x1000, 0x34}, {&(0x7f00000003c0)="ce957770e469062d595616ce06f7543115f295eaa5a23b1c4ed00c1902b554b55c0aeba68b735c2e41b7579553b2a42d949c276ce0a7c2c450202c558dbcb78d3b", 0x41, 0xff}, {&(0x7f0000000440)="5ff1b2ce", 0x4, 0x826}, {&(0x7f0000001900)="b0359b7bda41382ca6d666c58d1209e8b92242a0f1708ce757f134a112bce42fa5d701064b686b10a1d9588e52518d8524825cedeec3c92f0bed3249d7302509d04fa829e20b827b491a9fa9f7acd79a52d4109f12d169e6f1b01bf09aa2ec7fc668604b85cf1d680daf1588236e3d462cd0c231fe303426dc025fa82d849fcce1e65716a01187c25db6a92cb3f9f748a80a9b830c3a0d5cd617d73ee35cadbab3ea60b380ef46bdb9fc03a69ac850356dbd4ec75666f2e97625fceeb1bf317cc449a0fc4326a83225fb1d48d974b5b9c5", 0xd1, 0x7}, {&(0x7f0000000540)="732549c430de25506e9cea332bffdcb0b282b5b222884703be1f17bdfb0ed7764206480e346e5a1b9890477c89b5a4ddaa12d9a8cda67bb4a588c48304b682bd34f7eab72f557513b8bd3d37b1852497d49caff8f377bac5199888ae350c7c9f7c890a3b4702e02286c6f5c01a4b0bc07385568d4db0bcf6e2d8", 0x7a, 0x7ff}, {&(0x7f0000001a00)="b8d614499345b149ad2ebabde6b62ea6adcd9aeaefa90e3e80359e72b4ca393c0fabdcaf0e15d5d3426add721c2e77894fabb3cff29e88db5a8035f1a912a763f060238ace1afbcc0c8eb1ccca71b3854e91fd8382ad6f99e64a9df4d585542f271cff3a6f885dd7965a2ff57678690962301250b581aa2a29bd337bad718dd5c3f1a932b9a5f9be1d4f895df425ee721051983723b8ffc90d8189b7a28e1c6fc07aaf60299749c50642cd4fa50cb9762c773a9cb471af5f4e73dee7bad040fc7f4b08c3ca85b2a2c638596cdec7209d762a8c83b6cb0f5390e9", 0xda, 0x7}], 0x1000020, &(0x7f0000001bc0)={[{@uni_xlateno}, {@fat=@dos1xfloppy}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_winnt}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfsroot}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', r0}}, {@subj_user}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 20:21:12 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{0x0, 0x0, 0x2}, {0x0, 0x0, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0x0, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:21:12 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 57) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:21:12 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x11000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:21:12 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 20:21:12 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$nfs4(&(0x7f00000001c0), &(0x7f0000000340)='./file1\x00', 0x7, 0x9, &(0x7f0000001e00)=[{&(0x7f00000003c0)="22200d880d5225c2247cf92b3d26e6146b08e852e2421e17ad7e497d5457f4ad96d392e386a365989aa809687ad25cee5ef5c8fad17973b3b2aaa98bdd3775fd02bba00127a5d15cd159225bb80c813e773384e197a112de703a481aa9c56b76eeaf3bd6804b6276a972053419a50d5ebeed657493e90de13b47ebad22e13f434f002fbf6e61741e6120088e94d29b704bffa96228da130a41c0376e9d5a66f5422e4bc1c87b70769ae0782d0577bd1e6be8a25bbd80d6e0bf2827f8cf0e79bc68900659ed472deadf96c6b7ee8e4390440e2a261660141c4682076bc0b903c5943fc2ca357764ce659e6e276178ec8d414bec085250925957", 0xf9, 0x6}, {&(0x7f0000000540)="2131c36fe0377949d9b6e8b0a38b9e8c6b7a4a", 0x13, 0xc4f}, {&(0x7f0000001900)="7fa2577f5016c7efa5bfa4efd44c4f978229e110c109633155fb474fc2d958e5107ddbea30af8f6909e4eed74c1e65c45acc349ffa40d563b52dba6bd82837f82726542f09f3116c8da54849a0ced3cc44bb834e59fc01d3cdb0a80893e8dc3ddf13947396be871e247931af5e76e11110ef0786240bba9e61143fa96ffa257237c4b46b6c0f73da8ca9c2e9fc347a1f98206ac42187330963", 0x99, 0x10001}, {&(0x7f00000019c0)="b58095831e0a389c0bb55ccbeb67a999372061f657ae355ab99f19f1fd42f584d53039de11837c4412848470fb3cbff17072c70cb3bdb36225a260d70b07d83058ae2dfecb49746680de068d1960decc81fff028f7879282baed10c03a9d410253d5ffac8c8c1a0c47bbed3efd72087994645742db2cfc10033d1486c929bb8f2ce771dee16f28b08239340155001b816c15277580831dae6aa527e45dce3753ee55ac834d27897852366404655ddf3b925d185cd5538ba553c6921e222ac0f15257e13d82a4", 0xc6, 0x64e}, {&(0x7f0000001ac0)="71893b91900191d82cdb59ea5318860ef2c22626326070bee599cbcab231f3753ce8ef4ea715ec6a19fd3116de3f8b0f0f1900f8087f6bd99d9489633368532c84a2e5091708181ad853a10aedcda6ece838502064b82354bcdaa8a886d0dd66cfd5d99c06ec968785d3bcf20e55a2b5339ebe89d52f2e2afd051a8edc83c5f69b405189bb4b1f5425a905ff5c28da9b3511064a163fb57d6251b4c7afc8e1d24761ff25c3eca13653cac258feb675cd0ed32722775391cb76a1ab3ce8421649d078d379313102820752766e0f", 0xcd, 0x5}, {&(0x7f0000001bc0)="55b8fd6688218ed788e96cc4bf68a0f9d117d460defb4c5d9ee5ff36bae273df4b7a122f952712e1b5a554a2021361446ed7a080b50d2a6ae1732c75b8a239cafb99e680af79f9beaeade5bbaded02fb8ae88e2b29bec202c3da5847a445db00ba34bb35b3b9cb04e322fb0f5d681501cbd52f14e1307d66a1127be89f1b616d273b8249ca36c9831bfebcae730d430bbfc6cd63fd2bd4", 0x97, 0x100000000}, {&(0x7f0000000580)="769295597082073712a6760c795526f292382251ae2c1eddd4aa4a7a7730c46f94f4e82a0a8274f16606c112bc96075ef84c996e1d7c43b20aa54db702813f11a94030b4bbd73bbe94bea7e640", 0x4d, 0x2}, {&(0x7f0000001c80)="6dd779b743c0726ef8fe769ec2a69782600de08fceee87c92e93c6cf1ee83ab75498e1c875c9ebbf99be152c86eb241b1bcb3a49cfa75e949b12244f0c488b166ca9addc0b7134808973f242b4978722bae90f7f6bfcf4988bdf17ba4e18485026d75d578ce501d4105a7050231361e0618dc32760a216eaa5bda2b05445da0efb45d8ed2fa4144d663fa698a6043b7a64f32be0153be0ec72dbadf16eb914ae2523211c9ca10caf709933766b2f84b2fcc8f687ff0e", 0xb6, 0x6}, {&(0x7f0000000800)="63fdae56a199e5779db586267a4d2e71fe11bfe6378f524528d6ce1d5d3adb77ac0ec07dab8c61be0df3a94a0cb66c161ba05649c525c982e80b1c8ddc1d46fd40c7b58778ca49133673db85ff5fb5090e54b3bb8865553a08b70eaf498832eae1fbbc", 0x63, 0x10000}], 0x1, &(0x7f0000001d40)={[{'uid>'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}]}) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:21:12 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2932.190969] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2932.190969] program syz-executor.1 not setting count and/or reply_len properly [ 2932.213495] FAULT_INJECTION: forcing a failure. [ 2932.213495] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2932.215581] CPU: 1 PID: 15349 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2932.216767] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2932.218155] Call Trace: [ 2932.218596] dump_stack+0x107/0x167 [ 2932.219217] should_fail.cold+0x5/0xa [ 2932.219859] copy_page_from_iter+0x40a/0x900 [ 2932.220605] blk_rq_map_user_iov+0x138b/0x1a60 [ 2932.221395] ? blk_rq_unmap_user+0x750/0x750 [ 2932.222141] ? find_held_lock+0x2c/0x110 [ 2932.222865] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2932.223801] ? lock_downgrade+0x6d0/0x6d0 [ 2932.224499] ? import_single_range+0x24d/0x2e0 [ 2932.225286] blk_rq_map_user+0x103/0x170 [ 2932.225968] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2932.226609] loop2: detected capacity change from 0 to 135266304 [ 2932.226778] ? alloc_pages_current+0x18f/0x280 [ 2932.228710] ? sg_build_indirect.isra.0+0x448/0x710 [ 2932.229566] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2932.230454] ? sg_build_indirect.isra.0+0x710/0x710 [ 2932.231306] ? vprintk_func+0x93/0x140 [ 2932.231963] ? record_print_text.cold+0x16/0x16 [ 2932.232744] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2932.232757] nfs4: Unknown parameter 'uid>' [ 2932.234289] ? trace_hardirqs_on+0x5b/0x180 [ 2932.235019] sg_write.part.0+0x69e/0xaa0 [ 2932.235717] ? sg_new_write.isra.0+0x770/0x770 [ 2932.236478] ? find_held_lock+0x2c/0x110 [ 2932.237161] ? __might_fault+0xd3/0x180 [ 2932.237824] ? lock_downgrade+0x6d0/0x6d0 [ 2932.238531] ? _cond_resched+0x10/0x30 [ 2932.239187] ? inode_security+0x107/0x140 [ 2932.239879] ? avc_policy_seqno+0x9/0x70 [ 2932.240563] ? selinux_file_permission+0x92/0x520 [ 2932.241380] sg_write+0x87/0x120 [ 2932.241945] do_iter_write+0x4f0/0x700 [ 2932.242604] ? import_iovec+0x83/0xb0 [ 2932.243257] vfs_writev+0x1ae/0x620 [ 2932.243863] ? vfs_iter_write+0xa0/0xa0 [ 2932.244531] ? __fget_files+0x2cf/0x520 [ 2932.245199] ? lock_downgrade+0x6d0/0x6d0 [ 2932.245889] ? find_held_lock+0x2c/0x110 [ 2932.246573] ? ksys_write+0x12d/0x260 [ 2932.247221] ? __fget_files+0x2f8/0x520 [ 2932.247893] ? __fget_light+0xea/0x290 [ 2932.248541] do_writev+0x139/0x300 [ 2932.249142] ? vfs_writev+0x620/0x620 [ 2932.249767] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2932.250633] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2932.251493] do_syscall_64+0x33/0x40 [ 2932.252110] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2932.252948] RIP: 0033:0x7f952207fb19 [ 2932.253558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2932.256614] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2932.257864] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2932.259054] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000007 [ 2932.260246] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2932.261421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2932.262597] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:21:12 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{0x0, 0x0, 0x2}, {0x0, 0x0, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0x0, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:21:12 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 20:21:12 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x38000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) [ 2932.413874] loop2: detected capacity change from 0 to 135266304 [ 2932.416040] nfs4: Unknown parameter 'uid>' 20:21:27 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x77f) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) getuid() add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000640)) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x39000000, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 20:21:27 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x24, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @nested={0x5, 0x15, 0x0, 0x1, [@generic="df"]}]}, 0x24}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x10, 0x4) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000000)=0x1) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)="001dabe0d4dc03000000000000008b2428de4d72b89aeddb2a530000000000000000000c3f089694ed90fa7c43", 0x2d}], 0x1) (fail_nth: 58) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mreq(r5, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 20:21:27 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x162210, 0xb91}) syz_io_uring_setup(0x745f, &(0x7f0000000180)={0x0, 0x52e4, 0x1, 0x3, 0xa0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x236a, &(0x7f0000000540)={0x0, 0x590a, 0x0, 0x1, 0x3a6}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f00000005c0)=0x0, &(0x7f0000000680)) syz_io_uring_submit(r4, r3, &(0x7f0000000640)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) syz_io_uring_submit(r1, r3, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000340)=@generic={0x1e, "669fa65bd23475476489086fa576f84f0bf482a8d1a40a8dc5650331abb0452aa886c9c3cc97a089b7e5a82a1bf398f11e40fa0a39a52a9579ff42b2aceb90fdc9018e7f006e84f29a642caf82f19fa53590c1f618c586f99f4ee46a74c15242b64dbfff92afa01dc8fe7afd85f87a543266ba7081948066ee4996f0c8b0"}, 0x0, 0x0, 0x1}, 0x1f) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000500)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd, 0x8, 0x0, 0xfffffffb}, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x11) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:21:27 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) r1 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000340)=0x14) ioctl$int_in(r1, 0x5421, &(0x7f00000005c0)=0x6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_io_uring_setup(0x144e, &(0x7f0000000600)={0x0, 0xe8af}, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=r3]) sendto(r2, &(0x7f00000003c0)="359ca39d1301b718e5951e21ba04f95dec2374b61a8f7530581f3bb22b983663776d724b7fd071b4afe540f9aac13db0534268f7733fdcaeea610c60d9d0cd199ded2b66756f350e278d9284461661c88415704685f1878f5d0c5342b1988eaba6a88b5439c4271fe2cfca815cb99c7394bd5ff95aae71becbba615756d71655c145c11e99b06821a67c0872ac13ef3c7b1804a112f3f0639e3064c01076ea7fca6217f9f6d9f7462ea75f7bbb66b78e177533e37e9e811d934087167adc58722a94", 0xc2, 0x1, &(0x7f0000000540)=@un=@file={0x1, './file0\x00'}, 0x80) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x18, 0x9, 0x0, 0x0, 0x0, 0x1062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_void(r6, 0x1, 0x0, 0x0, 0x0) 20:21:27 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x365301, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001880)=[{0x0, 0x0, 0x2}, {0x0, 0x0, 0x7f}, {&(0x7f0000000240), 0x0, 0x3f}], 0xa18000, 0x0) 20:21:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xbf3919ce, &(0x7f0000001880), 0xa18000, &(0x7f00000007c0)) 20:21:27 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 20:21:27 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946", 0xe, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2946.822480] loop1: detected capacity change from 0 to 33559552 [ 2946.833423] blktrace: Concurrent blktraces are not allowed on loop14 20:21:27 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 2946.890250] sg_write: data in/out 253104/8 bytes for SCSI command 0x3f-- guessing data in; [ 2946.890250] program syz-executor.1 not setting count and/or reply_len properly [ 2946.894283] FAULT_INJECTION: forcing a failure. [ 2946.894283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2946.896851] CPU: 1 PID: 15398 Comm: syz-executor.1 Not tainted 5.10.235 #1 [ 2946.898335] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2946.900115] Call Trace: [ 2946.900678] dump_stack+0x107/0x167 [ 2946.901468] should_fail.cold+0x5/0xa [ 2946.902291] copy_page_from_iter+0x40a/0x900 [ 2946.903265] blk_rq_map_user_iov+0x138b/0x1a60 [ 2946.904265] ? blk_rq_unmap_user+0x750/0x750 [ 2946.905213] ? find_held_lock+0x2c/0x110 [ 2946.906076] ? sg_common_write.constprop.0+0x9b6/0x1a30 [ 2946.907210] ? lock_downgrade+0x6d0/0x6d0 [ 2946.908104] ? import_single_range+0x24d/0x2e0 [ 2946.909084] blk_rq_map_user+0x103/0x170 [ 2946.909952] ? blk_rq_map_user_iov+0x1a60/0x1a60 [ 2946.910963] ? alloc_pages_current+0x18f/0x280 [ 2946.911959] ? sg_build_indirect.isra.0+0x448/0x710 [ 2946.913030] sg_common_write.constprop.0+0x10ed/0x1a30 [ 2946.914158] ? sg_build_indirect.isra.0+0x710/0x710 [ 2946.915220] ? vprintk_func+0x93/0x140 [ 2946.916077] ? record_print_text.cold+0x16/0x16 [ 2946.917076] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2946.918161] ? trace_hardirqs_on+0x5b/0x180 [ 2946.919083] sg_write.part.0+0x69e/0xaa0 [ 2946.919974] ? sg_new_write.isra.0+0x770/0x770 [ 2946.920955] ? find_held_lock+0x2c/0x110 [ 2946.921832] ? __might_fault+0xd3/0x180 [ 2946.922683] ? lock_downgrade+0x6d0/0x6d0 [ 2946.923605] ? _cond_resched+0x10/0x30 20:21:27 executing program 2: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x800) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2946.924426] ? inode_security+0x107/0x140 [ 2946.925541] ? avc_policy_seqno+0x9/0x70 [ 2946.926408] ? selinux_file_permission+0x92/0x520 [ 2946.927460] sg_write+0x87/0x120 [ 2946.928192] do_iter_write+0x4f0/0x700 [ 2946.929014] ? import_iovec+0x83/0xb0 [ 2946.929834] vfs_writev+0x1ae/0x620 [ 2946.930613] ? vfs_iter_write+0xa0/0xa0 [ 2946.931480] ? __fget_files+0x2cf/0x520 [ 2946.932524] ? lock_downgrade+0x6d0/0x6d0 [ 2946.933411] ? find_held_lock+0x2c/0x110 [ 2946.934384] ? ksys_write+0x12d/0x260 [ 2946.935337] ? __fget_files+0x2f8/0x520 [ 2946.936298] ? __fget_light+0xea/0x290 [ 2946.937132] do_writev+0x139/0x300 [ 2946.938089] ? vfs_writev+0x620/0x620 [ 2946.938963] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2946.940075] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2946.941302] do_syscall_64+0x33/0x40 [ 2946.942105] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2946.943325] RIP: 0033:0x7f952207fb19 [ 2946.944123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2946.948215] RSP: 002b:00007f951f5d4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 2946.949848] RAX: ffffffffffffffda RBX: 00007f9522193020 RCX: 00007f952207fb19 [ 2946.951367] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000008 [ 2946.952904] RBP: 00007f951f5d41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2946.954421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2946.955937] R13: 00007ffd2a29b96f R14: 00007f951f5d4300 R15: 0000000000022000 20:21:27 executing program 3: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 20:21:27 executing program 4: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0x6e, &(0x7f0000000540)=[{&(0x7f0000000440)=""/84, 0x54}, {&(0x7f00000001c0)=""/36, 0x24}, {&(0x7f0000000340)=""/19, 0x13}], 0x3, &(0x7f0000001900)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb8}, 0x100) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946dec4f03b6dbb7a4b9a35e7ad740b", 0x1c, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) 20:21:27 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x0, 0x0, 0x800048, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f53d05eb18000000000"], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x10000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000003c0)=""/200, 0xc8, 0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x365301, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xe5, 0x5, 0x9f, 0xfe, 0x0, 0x4, 0x1480c, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3ff}, 0x500, 0x9, 0x1eec74b, 0x5, 0x7f, 0x23aa, 0x6, 0x0, 0x4, 0x0, 0xbe44}, 0x0, 0x4, r1, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000800)=0xffffffff) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000200)='./file0\x00', 0xff, 0x3, &(0x7f0000001880)=[{&(0x7f0000000600)="869f2384bc85613c7082d0a2ddc80735049caa8ce3e84bb13022d95fb7e40608a43690dcfe332c9f0d77233c7c6b07d4afe5e14d9a85be225abfe0fe3ab38a813d4ac38079229e69d3118b01dcb11f4e15a1834da258463cfa9179f41749a6aee1737cdb499495446d2745255c30d7cdf3c88ae8514ffc2cc56c8329c443385656c1bb5f7dbc923769b8a007cbd0da6a", 0x90, 0x2}, {&(0x7f00000006c0)="b64e82249cb1ea802c5a251a6df02e6a9e9b89ee7829cd8b22fa50801cb2deb57d876da82ce0a6c8b87eaa1f5dec6bc3d8e86335c23f3f3e1b2f100125f9bca461830ecb060d3262673b3417bbca2cf4517733ab35b982310d09d2c15158a9f9d3a0d98ebfb8f11f5763cdef8343a51a6ed5f8fca8965d7d777545591979a913369b9b5b243cab53abfd982f845b56fab9e92a941a926d3d5f4a7e6e426a61de90905533843185d74039b7666d1e2f434398b1eee886443828502489a0e6d9a39404241ef91e26f314854a6c327ba3985b3e4c8259a0eb948058be1d80746a93c14e7b", 0xe3, 0x7f}, {&(0x7f0000000240)="783fab30dd5319c5630631ea9946", 0xe, 0x3f}], 0xa18000, &(0x7f00000007c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@uid_gt}]}) [ 2950.516141] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2950.518953] CPU: 1 PID: 255 Comm: syz-fuzzer Not tainted 5.10.235 #1 [ 2950.520406] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2950.522250] Call Trace: [ 2950.522887] dump_stack+0x107/0x167 [ 2950.523743] dump_header+0x107/0x689 [ 2950.524519] oom_kill_process.cold+0x10/0x15 [ 2950.525473] out_of_memory+0x1149/0x1440 [ 2950.526355] ? oom_killer_disable+0x280/0x280 [ 2950.527333] ? mutex_trylock+0x237/0x2b0 [ 2950.528204] ? __alloc_pages_slowpath.constprop.0+0xa7c/0x2170 [ 2950.529467] __alloc_pages_slowpath.constprop.0+0x1b6d/0x2170 [ 2950.530723] ? lock_acquire+0xb7/0x470 [ 2950.531566] ? warn_alloc+0x190/0x190 [ 2950.532388] __alloc_pages_nodemask+0x51d/0x600 [ 2950.533375] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2950.534645] ? find_get_entry+0x2c8/0x740 [ 2950.535537] alloc_pages_current+0x187/0x280 [ 2950.536466] __page_cache_alloc+0x2d2/0x360 [ 2950.537382] pagecache_get_page+0x2c7/0xc80 [ 2950.538296] filemap_fault+0x177d/0x2210 [ 2950.539162] ? read_cache_page_gfp+0x30/0x30 [ 2950.540106] ? replace_page_cache_page+0x1200/0x1200 [ 2950.541181] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2950.542291] ext4_filemap_fault+0x87/0xc0 [ 2950.543172] __do_fault+0x113/0x410 [ 2950.543955] handle_mm_fault+0x1e53/0x3500 [ 2950.544855] ? _copy_from_user+0xfb/0x1b0 [ 2950.545732] ? __pmd_alloc+0x5e0/0x5e0 [ 2950.546565] ? vmacache_find+0x55/0x2a0 [ 2950.547407] ? vmacache_update+0xce/0x140 [ 2950.548290] do_user_addr_fault+0x56e/0xc60 [ 2950.549216] exc_page_fault+0xa2/0x1a0 [ 2950.550043] ? asm_exc_page_fault+0x8/0x30 [ 2950.550933] asm_exc_page_fault+0x1e/0x30 [ 2950.551806] RIP: 0033:0x466533 [ 2950.552498] Code: Unable to access opcode bytes at RIP 0x466509. [ 2950.553773] RSP: 002b:000000c00003fe80 EFLAGS: 00010202 [ 2950.554897] RAX: ffffffffffffff92 RBX: 0000000026c82246 RCX: 0000000000466533 [ 2950.556410] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000000001f20e78 [ 2950.557916] RBP: 000000c00003fec8 R08: 0000000000000000 R09: 0000000000000000 [ 2950.559432] R10: 000000c00003feb8 R11: 0000000000000202 R12: 0000000000438880 [ 2950.560976] R13: 0000000000000000 R14: 0000000000e5de2c R15: 0000000000000000 [ 2950.564797] Mem-Info: [ 2950.565624] active_anon:1543 inactive_anon:55875 isolated_anon:0 [ 2950.565624] active_file:31 inactive_file:8 isolated_file:0 [ 2950.565624] unevictable:8 dirty:0 writeback:0 [ 2950.565624] slab_reclaimable:8486 slab_unreclaimable:59963 [ 2950.565624] mapped:69634 shmem:117 pagetables:1415 bounce:0 [ 2950.565624] free:2844 free_pcp:0 free_cma:0 [ 2950.572240] Node 0 active_anon:6172kB inactive_anon:223500kB active_file:124kB inactive_file:116kB unevictable:32kB isolated(anon):0kB isolated(file):0kB mapped:278536kB dirty:0kB writeback:0kB shmem:468kB writeback_tmp:0kB kernel_stack:4160kB all_unreclaimable? yes [ 2950.577140] Node 0 DMA free:6508kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2950.582600] lowmem_reserve[]: 0 1616 1616 1616 [ 2950.583641] Node 0 DMA32 free:4868kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:6172kB inactive_anon:223500kB active_file:28kB inactive_file:132kB unevictable:32kB writepending:0kB present:2080640kB managed:1660448kB mlocked:32kB pagetables:5660kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2950.589619] lowmem_reserve[]: 0 0 0 0 [ 2950.590500] Node 0 DMA: 1*4kB (U) 1*8kB (U) 0*16kB 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6508kB [ 2950.593546] Node 0 DMA32: 490*4kB (UME) 152*8kB (ME) 43*16kB (UME) 39*32kB (UME) 4*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5368kB [ 2950.596605] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2950.598414] 159 total pagecache pages [ 2950.599239] 0 pages in swap cache [ 2950.599972] Swap cache stats: add 0, delete 0, find 0/0 [ 2950.601114] Free swap = 0kB [ 2950.601749] Total swap = 0kB [ 2950.602414] 524158 pages RAM [ 2950.603035] 0 pages HighMem/MovableOnly [ 2950.603897] 105069 pages reserved [ 2950.604719] Unreclaimable slab info: [ 2950.605840] Name Used Total [ 2950.607121] pid_2 67KB 67KB [ 2950.608268] ip6-frags 7KB 7KB [ 2950.609391] fib6_nodes 28KB 28KB [ 2950.610525] ip6_dst_cache 41KB 41KB [ 2950.611680] PINGv6 63KB 63KB [ 2950.612819] RAWv6 157KB 157KB [ 2950.613933] UDPLITEv6 62KB 62KB [ 2950.615062] UDPv6 62KB 62KB [ 2950.616212] request_sock_TCPv6 15KB 15KB [ 2950.617573] TCPv6 62KB 62KB [ 2950.618861] scsi_sense_cache 8KB 8KB [ 2950.620019] sd_ext_cdb 3KB 3KB [ 2950.621188] virtio_scsi_cmd 16KB 16KB [ 2950.622313] sgpool-128 59KB 59KB [ 2950.623442] sgpool-64 63KB 63KB [ 2950.624564] sgpool-32 63KB 63KB [ 2950.625679] sgpool-16 45KB 45KB [ 2950.626830] sgpool-8 37KB 37KB [ 2950.627971] io_kiocb 33KB 33KB [ 2950.629224] mqueue_inode_cache 62KB 62KB [ 2950.630479] nfs_commit_data 15KB 15KB [ 2950.631690] nfs_write_data 47KB 47KB [ 2950.632867] jbd2_inode 7KB 7KB [ 2950.634034] ext4_system_zone 3KB 3KB [ 2950.635176] ext4_io_end_vec 7KB 7KB [ 2950.636317] ext4_bio_post_read_ctx 15KB 15KB [ 2950.637640] kioctx 31KB 31KB [ 2950.638770] aio_kiocb 7KB 7KB [ 2950.639934] bio-2 4KB 4KB [ 2950.641089] fasync_cache 3KB 3KB [ 2950.642219] pid_namespace 7KB 7KB [ 2950.643441] posix_timers_cache 15KB 15KB [ 2950.644846] rpc_buffers 31KB 31KB [ 2950.646176] rpc_tasks 3KB 3KB [ 2950.647529] UNIX 216KB 320KB [ 2950.648864] tcp_bind_bucket 8KB 8KB [ 2950.650197] ip_fib_trie 8KB 8KB [ 2950.651544] ip_fib_alias 15KB 15KB [ 2950.652866] ip_dst_cache 16KB 16KB [ 2950.654199] PING 62KB 62KB [ 2950.655545] RAW 187KB 187KB [ 2950.656875] UDP 316KB 346KB [ 2950.658166] request_sock_TCP 7KB 7KB [ 2950.659454] TCP 60KB 60KB [ 2950.660679] hugetlbfs_inode_cache 45KB 45KB [ 2950.661962] bio-1 11KB 11KB [ 2950.663202] eventpoll_pwq 19KB 19KB [ 2950.664395] eventpoll_epi 55KB 55KB [ 2950.665578] inotify_inode_mark 44KB 62KB [ 2950.666778] request_queue 90KB 90KB [ 2950.667967] blkdev_ioc 33KB 33KB [ 2950.669138] bio-0 100KB 100KB [ 2950.670324] biovec-max 603KB 867KB [ 2950.671518] biovec-64 141KB 189KB [ 2950.672695] biovec-16 33KB 33KB [ 2950.673873] user_namespace 15KB 15KB [ 2950.675044] uid_cache 8KB 8KB [ 2950.676227] dmaengine-unmap-2 4KB 4KB [ 2950.677416] audit_buffer 7KB 7KB [ 2950.678596] skbuff_fclone_cache 120KB 120KB [ 2950.679901] skbuff_head_cache 504KB 765KB [ 2950.681096] file_lock_cache 35KB 51KB [ 2950.682273] file_lock_ctx 7KB 7KB [ 2950.683464] fsnotify_mark_connector 60KB 60KB [ 2950.684743] net_namespace 86KB 86KB [ 2950.685968] task_delay_info 119KB 119KB [ 2950.687154] taskstats 46KB 46KB [ 2950.688365] proc_dir_entry 347KB 367KB [ 2950.689579] pde_opener 35KB 35KB [ 2950.690762] seq_file 34KB 48KB [ 2950.691967] sigqueue 106KB 106KB [ 2950.693161] shmem_inode_cache 1256KB 1383KB [ 2950.694379] kernfs_iattrs_cache 219KB 219KB [ 2950.695606] kernfs_node_cache 5164KB 5164KB [ 2950.696973] mnt_cache 181KB 181KB [ 2950.698232] filp 1705KB 1875KB [ 2950.699522] names_cache 12605KB 13056KB [ 2950.700791] hashtab_node 274KB 274KB [ 2950.701963] ebitmap_node 1149KB 1149KB [ 2950.703143] avtab_node 4976KB 4976KB [ 2950.704354] avc_node 35KB 35KB [ 2950.705657] lsm_inode_cache 3257KB 3257KB [ 2950.706925] lsm_file_cache 148KB 196KB [ 2950.708226] key_jar 39KB 39KB [ 2950.709400] uts_namespace 15KB 15KB [ 2950.710569] nsproxy 7KB 7KB [ 2950.711788] vm_area_struct 901KB 1064KB [ 2950.712954] fs_cache 52KB 52KB [ 2950.714136] files_cache 270KB 270KB [ 2950.715319] signal_cache 312KB 401KB [ 2950.716506] sighand_cache 289KB 360KB [ 2950.717680] task_struct 1050KB 1443KB [ 2950.718853] cred_jar 139KB 192KB [ 2950.720043] anon_vma_chain 222KB 267KB [ 2950.721222] anon_vma 262KB 262KB [ 2950.722399] pid 64KB 71KB [ 2950.723594] Acpi-Operand 223KB 261KB [ 2950.724780] Acpi-ParseExt 27KB 27KB [ 2950.725959] Acpi-Parse 209KB 225KB [ 2950.727133] Acpi-State 86KB 102KB [ 2950.728321] Acpi-Namespace 24KB 24KB [ 2950.729502] numa_policy 3KB 3KB [ 2950.730680] trace_event_file 176KB 176KB [ 2950.731874] ftrace_event_field 280KB 280KB [ 2950.733096] pool_workqueue 32KB 32KB [ 2950.734273] task_group 16KB 16KB [ 2950.735463] mm_struct 283KB 346KB [ 2950.736631] vmap_area 228KB 228KB [ 2950.737791] page->ptl 184KB 252KB [ 2950.738952] kmemleak_scan_area 143KB 143KB [ 2950.741041] kmemleak_object 138672KB 150196KB [ 2950.742222] kmalloc-8k 4544KB 4640KB [ 2950.743403] kmalloc-4k 6736KB 7936KB [ 2950.744568] kmalloc-2k 3824KB 4288KB [ 2950.745735] kmalloc-1k 2162KB 3264KB [ 2950.746930] kmalloc-512 3091KB 5136KB [ 2950.748107] kmalloc-256 1288KB 1288KB [ 2950.749269] kmalloc-192 564KB 564KB [ 2950.750430] kmalloc-128 485KB 520KB [ 2950.751615] kmalloc-96 390KB 624KB [ 2950.752800] kmalloc-64 893KB 1248KB [ 2950.753963] kmalloc-32 839KB 936KB [ 2950.755122] kmalloc-16 314KB 356KB [ 2950.756300] kmalloc-8 308KB 338KB [ 2950.757461] kmem_cache_node 47KB 47KB [ 2950.758614] kmem_cache 75KB 75KB [ 2950.759792] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=syz-fuzzer,pid=255,uid=0 [ 2950.764739] Out of memory (oom_kill_allocating_task): Killed process 254 (syz-fuzzer) total-vm:1240020kB, anon-rss:191796kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:904kB oom_score_adj:0 [ 2953.155437] systemd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2953.157495] CPU: 0 PID: 1 Comm: systemd Not tainted 5.10.235 #1 [ 2953.158737] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2953.160486] Call Trace: [ 2953.161043] dump_stack+0x107/0x167 [ 2953.161811] dump_header+0x107/0x689 [ 2953.162598] oom_kill_process.cold+0x10/0x15 [ 2953.163538] out_of_memory+0x358/0x1440 [ 2953.164379] ? oom_killer_disable+0x280/0x280 [ 2953.165321] ? mutex_trylock+0x237/0x2b0 [ 2953.166168] ? __alloc_pages_slowpath.constprop.0+0xa7c/0x2170 [ 2953.167419] __alloc_pages_slowpath.constprop.0+0x1b6d/0x2170 [ 2953.168653] ? lock_acquire+0xb7/0x470 [ 2953.169479] ? warn_alloc+0x190/0x190 [ 2953.170301] __alloc_pages_nodemask+0x51d/0x600 [ 2953.171282] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2953.172566] ? find_get_entry+0x2c8/0x740 [ 2953.173450] alloc_pages_current+0x187/0x280 [ 2953.174379] __page_cache_alloc+0x2d2/0x360 [ 2953.175296] pagecache_get_page+0x2c7/0xc80 [ 2953.176219] filemap_fault+0x177d/0x2210 [ 2953.177082] ? read_cache_page_gfp+0x30/0x30 [ 2953.178011] ? replace_page_cache_page+0x1200/0x1200 [ 2953.179089] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2953.180221] ext4_filemap_fault+0x87/0xc0 [ 2953.181104] __do_fault+0x113/0x410 [ 2953.181887] handle_mm_fault+0x1e53/0x3500 [ 2953.182791] ? lock_is_held_type+0xd2/0x110 [ 2953.183715] ? find_held_lock+0x2c/0x110 [ 2953.184579] ? __pmd_alloc+0x5e0/0x5e0 [ 2953.185416] ? vmacache_find+0x55/0x2a0 [ 2953.186281] do_user_addr_fault+0x56e/0xc60 [ 2953.187214] exc_page_fault+0xa2/0x1a0 [ 2953.188060] ? asm_exc_page_fault+0x8/0x30 [ 2953.188963] asm_exc_page_fault+0x1e/0x30 [ 2953.189841] RIP: 0033:0x7f3ed54274d0 [ 2953.190637] Code: Unable to access opcode bytes at RIP 0x7f3ed54274a6. [ 2953.192045] RSP: 002b:00007fffd555bcf8 EFLAGS: 00010206 [ 2953.193185] RAX: 000055b6e56cca40 RBX: 000055b6e56a84d0 RCX: 000055b6e4d9c010 [ 2953.194709] RDX: 00007fffd555be10 RSI: 000000000000003d RDI: 000055b6e56d2a40 [ 2953.196257] RBP: 000055b6e56d2a40 R08: 0000000000000000 R09: 005354504f5f4448 [ 2953.197797] R10: 0000000000000004 R11: 0000000000000202 R12: 0000000000000000 [ 2953.199344] R13: 0000000000000000 R14: 00007fffd555be20 R15: 00007fffd555be08 [ 2953.200946] Mem-Info: [ 2953.201483] active_anon:32 inactive_anon:7710 isolated_anon:0 [ 2953.201483] active_file:18 inactive_file:17 isolated_file:0 [ 2953.201483] unevictable:0 dirty:0 writeback:0 [ 2953.201483] slab_reclaimable:7307 slab_unreclaimable:56867 [ 2953.201483] mapped:8706 shmem:72 pagetables:344 bounce:0 [ 2953.201483] free:3173 free_pcp:62 free_cma:0 [ 2953.207439] Node 0 active_anon:128kB inactive_anon:30840kB active_file:72kB inactive_file:68kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34824kB dirty:0kB writeback:0kB shmem:288kB writeback_tmp:0kB kernel_stack:3104kB all_unreclaimable? no [ 2953.211873] Node 0 DMA free:6508kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2953.216987] lowmem_reserve[]: 0 1616 1616 1616 [ 2953.217938] Node 0 DMA32 free:6184kB min:7164kB low:8816kB high:10468kB reserved_highatomic:0KB active_anon:128kB inactive_anon:30840kB active_file:72kB inactive_file:68kB unevictable:0kB writepending:0kB present:2080640kB managed:1660448kB mlocked:0kB pagetables:1376kB bounce:0kB free_pcp:248kB local_pcp:0kB free_cma:0kB [ 2953.223487] lowmem_reserve[]: 0 0 0 0 [ 2953.224319] Node 0 DMA: 1*4kB (U) 1*8kB (U) 0*16kB 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6508kB [ 2953.227009] Node 0 DMA32: 518*4kB (ME) 204*8kB (ME) 73*16kB (ME) 33*32kB (UM) 4*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 6184kB [ 2953.229772] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2953.231447] 107 total pagecache pages [ 2953.232209] 0 pages in swap cache [ 2953.232879] Swap cache stats: add 0, delete 0, find 0/0 [ 2953.233968] Free swap = 0kB [ 2953.234582] Total swap = 0kB [ 2953.235191] 524158 pages RAM [ 2953.235787] 0 pages HighMem/MovableOnly [ 2953.236575] 105069 pages reserved [ 2953.237262] Unreclaimable slab info: [ 2953.237981] Name Used Total [ 2953.239086] pid_2 67KB 67KB [ 2953.240158] ip6-frags 7KB 7KB [ 2953.241213] fib6_nodes 28KB 28KB [ 2953.242269] ip6_dst_cache 41KB 41KB [ 2953.243339] PINGv6 63KB 63KB [ 2953.244399] RAWv6 157KB 157KB [ 2953.245457] UDPLITEv6 62KB 62KB [ 2953.246512] UDPv6 62KB 62KB [ 2953.247576] request_sock_TCPv6 15KB 15KB [ 2953.248632] TCPv6 62KB 62KB [ 2953.249680] scsi_sense_cache 8KB 8KB [ 2953.250718] sd_ext_cdb 3KB 3KB [ 2953.251770] virtio_scsi_cmd 16KB 16KB [ 2953.252813] sgpool-128 59KB 59KB [ 2953.253847] sgpool-64 63KB 63KB [ 2953.254882] sgpool-32 488KB 488KB [ 2953.255935] sgpool-16 165KB 165KB [ 2953.256968] sgpool-8 135KB 135KB [ 2953.258001] io_kiocb 33KB 33KB [ 2953.259035] mqueue_inode_cache 62KB 62KB [ 2953.260102] nfs_commit_data 15KB 15KB [ 2953.261140] nfs_write_data 47KB 47KB [ 2953.262179] jbd2_inode 7KB 7KB [ 2953.263219] ext4_system_zone 3KB 3KB [ 2953.264266] ext4_io_end_vec 7KB 7KB [ 2953.265303] ext4_bio_post_read_ctx 15KB 15KB [ 2953.266422] kioctx 31KB 31KB [ 2953.267467] aio_kiocb 7KB 7KB [ 2953.268503] bio-2 4KB 4KB [ 2953.269525] fasync_cache 3KB 3KB [ 2953.270548] pid_namespace 7KB 7KB [ 2953.271582] posix_timers_cache 15KB 15KB [ 2953.272624] rpc_buffers 31KB 31KB [ 2953.273650] rpc_tasks 3KB 3KB [ 2953.274671] UNIX 216KB 320KB [ 2953.275715] tcp_bind_bucket 8KB 8KB [ 2953.276738] ip_fib_trie 8KB 8KB [ 2953.277757] ip_fib_alias 15KB 15KB [ 2953.278777] ip_dst_cache 16KB 16KB [ 2953.279807] PING 62KB 62KB [ 2953.280828] RAW 187KB 187KB [ 2953.281850] UDP 316KB 346KB [ 2953.282870] tw_sock_TCP 7KB 7KB [ 2953.283896] request_sock_TCP 7KB 7KB [ 2953.284914] TCP 60KB 60KB [ 2953.285932] hugetlbfs_inode_cache 45KB 45KB [ 2953.287047] bio-1 11KB 11KB [ 2953.288090] eventpoll_pwq 19KB 19KB [ 2953.289320] eventpoll_epi 55KB 55KB [ 2953.290332] inotify_inode_mark 44KB 62KB [ 2953.291370] request_queue 90KB 90KB [ 2953.292381] blkdev_ioc 33KB 33KB [ 2953.293390] bio-0 520KB 520KB [ 2953.294401] biovec-max 531KB 714KB [ 2953.295423] biovec-64 614KB 614KB [ 2953.296429] biovec-16 127KB 127KB [ 2953.297436] user_namespace 15KB 15KB [ 2953.298443] uid_cache 8KB 8KB [ 2953.299464] dmaengine-unmap-2 4KB 4KB [ 2953.300472] audit_buffer 7KB 7KB [ 2953.301480] skbuff_fclone_cache 120KB 120KB [ 2953.302520] skbuff_head_cache 701KB 701KB [ 2953.303538] file_lock_cache 35KB 51KB [ 2953.304544] file_lock_ctx 7KB 7KB [ 2953.305552] fsnotify_mark_connector 60KB 60KB [ 2953.306653] net_namespace 86KB 86KB [ 2953.307667] task_delay_info 119KB 119KB [ 2953.308674] taskstats 46KB 46KB [ 2953.309667] proc_dir_entry 347KB 367KB [ 2953.310662] pde_opener 35KB 35KB [ 2953.311668] seq_file 34KB 41KB [ 2953.312662] sigqueue 106KB 106KB [ 2953.313658] shmem_inode_cache 1252KB 1383KB [ 2953.314656] kernfs_iattrs_cache 219KB 219KB [ 2953.315699] kernfs_node_cache 5135KB 5145KB [ 2953.316696] mnt_cache 181KB 181KB [ 2953.317732] filp 822KB 1372KB [ 2953.318728] names_cache 4403KB 4483KB [ 2953.319738] hashtab_node 274KB 274KB [ 2953.320733] ebitmap_node 1149KB 1149KB [ 2953.321735] avtab_node 4976KB 4976KB [ 2953.322739] avc_node 35KB 35KB [ 2953.323778] lsm_inode_cache 2657KB 3043KB [ 2953.324791] lsm_file_cache 148KB 196KB [ 2953.325906] key_jar 39KB 39KB [ 2953.327117] uts_namespace 15KB 15KB [ 2953.328302] nsproxy 7KB 7KB [ 2953.329442] vm_area_struct 881KB 1056KB [ 2953.330426] fs_cache 52KB 52KB [ 2953.331415] files_cache 270KB 270KB [ 2953.332393] signal_cache 312KB 401KB [ 2953.333353] sighand_cache 233KB 360KB [ 2953.334323] task_struct 990KB 1443KB [ 2953.335302] cred_jar 100KB 192KB [ 2953.336288] anon_vma_chain 222KB 267KB [ 2953.337253] anon_vma 183KB 235KB [ 2953.338233] pid 64KB 71KB [ 2953.339211] Acpi-Operand 223KB 261KB [ 2953.340183] Acpi-ParseExt 27KB 27KB [ 2953.341149] Acpi-Parse 209KB 225KB [ 2953.342112] Acpi-State 86KB 102KB [ 2953.343053] Acpi-Namespace 24KB 24KB [ 2953.344019] numa_policy 3KB 3KB [ 2953.344976] trace_event_file 176KB 176KB [ 2953.345929] ftrace_event_field 280KB 280KB [ 2953.346893] pool_workqueue 32KB 32KB [ 2953.347852] task_group 16KB 16KB [ 2953.348822] mm_struct 283KB 346KB [ 2953.349776] vmap_area 228KB 228KB [ 2953.350740] page->ptl 176KB 240KB [ 2953.351695] kmemleak_scan_area 143KB 143KB [ 2953.354019] kmemleak_object 130423KB 149164KB [ 2953.355176] kmalloc-8k 4544KB 4640KB [ 2953.356198] kmalloc-4k 7464KB 7744KB [ 2953.357154] kmalloc-2k 4092KB 4288KB [ 2953.358120] kmalloc-1k 2648KB 3264KB [ 2953.359097] kmalloc-512 3370KB 4592KB [ 2953.360046] kmalloc-256 1250KB 1272KB [ 2953.360996] kmalloc-192 604KB 604KB [ 2953.361962] kmalloc-128 473KB 520KB [ 2953.362930] kmalloc-96 383KB 612KB [ 2953.363921] kmalloc-64 895KB 1220KB [ 2953.364893] kmalloc-32 775KB 932KB [ 2953.365843] kmalloc-16 314KB 356KB [ 2953.366792] kmalloc-8 308KB 338KB [ 2953.367734] kmem_cache_node 47KB 47KB [ 2953.368677] kmem_cache 75KB 75KB [ 2953.369615] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/syz7,task=syz-executor.7,pid=15386,uid=0 [ 2953.372110] Out of memory: Killed process 15393 (syz-executor.7) total-vm:95836kB, anon-rss:448kB, file-rss:34820kB, shmem-rss:0kB, UID:0 pgtables:144kB oom_score_adj:1000 [ 2953.436368] systemd-journal invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-250 [ 2953.438638] CPU: 0 PID: 103 Comm: systemd-journal Not tainted 5.10.235 #1 [ 2953.440071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2953.441784] Call Trace: [ 2953.442342] dump_stack+0x107/0x167 [ 2953.443100] dump_header+0x107/0x689 [ 2953.443882] oom_kill_process.cold+0x10/0x15 [ 2953.444801] out_of_memory+0x1149/0x1440 [ 2953.445661] ? oom_killer_disable+0x280/0x280 [ 2953.446599] ? mutex_trylock+0x237/0x2b0 [ 2953.447468] ? __alloc_pages_slowpath.constprop.0+0xa7c/0x2170 [ 2953.448722] __alloc_pages_slowpath.constprop.0+0x1b6d/0x2170 [ 2953.449985] ? warn_alloc+0x190/0x190 [ 2953.450713] __alloc_pages_nodemask+0x51d/0x600 [ 2953.451684] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2953.452929] ? find_get_entry+0x2c8/0x740 [ 2953.453796] alloc_pages_current+0x187/0x280 [ 2953.454665] __page_cache_alloc+0x2d2/0x360 [ 2953.455529] pagecache_get_page+0x2c7/0xc80 [ 2953.456385] filemap_fault+0x177d/0x2210 [ 2953.457163] ? read_cache_page_gfp+0x30/0x30 [ 2953.458029] ? replace_page_cache_page+0x1200/0x1200 [ 2953.458952] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2953.459927] ext4_filemap_fault+0x87/0xc0 [ 2953.460633] __do_fault+0x113/0x410 [ 2953.461260] handle_mm_fault+0x1e53/0x3500 [ 2953.462006] ? find_held_lock+0x2c/0x110 [ 2953.462715] ? __pmd_alloc+0x5e0/0x5e0 [ 2953.463402] ? vmacache_find+0x55/0x2a0 [ 2953.464081] ? vmacache_update+0xce/0x140 [ 2953.464857] do_user_addr_fault+0x56e/0xc60 [ 2953.465612] exc_page_fault+0xa2/0x1a0 [ 2953.466280] ? asm_exc_page_fault+0x8/0x30 [ 2953.467002] asm_exc_page_fault+0x1e/0x30 [ 2953.467716] RIP: 0033:0x7f4155b32846 [ 2953.468368] Code: Unable to access opcode bytes at RIP 0x7f4155b3281c. [ 2953.469497] RSP: 002b:00007ffc3d3a3f00 EFLAGS: 00010297 [ 2953.470406] RAX: 0000000066fe16fc RBX: 000055d5657f4c90 RCX: 00000000410b4922 [ 2953.471652] RDX: 00000000498ced70 RSI: 0000000000000002 RDI: 000055d5657f4cb4 [ 2953.472881] RBP: 000055d5657e9400 R08: 00007ffc3d3a3f10 R09: 00007ffc3d3a3f14 [ 2953.474094] R10: 00007f4155b96a34 R11: 000055d5657e9400 R12: 0000000000000026 [ 2953.475310] R13: 0000000000000000 R14: 00007ffc3d3a3fc8 R15: 00007ffc3d3a3f50 [ 2953.476703] Mem-Info: [ 2953.477172] active_anon:32 inactive_anon:7710 isolated_anon:0 [ 2953.477172] active_file:18 inactive_file:17 isolated_file:0 [ 2953.477172] unevictable:0 dirty:0 writeback:0 [ 2953.477172] slab_reclaimable:7307 slab_unreclaimable:56867 [ 2953.477172] mapped:8706 shmem:72 pagetables:344 bounce:0 [ 2953.477172] free:2410 free_pcp:61 free_cma:0 [ 2953.482407] Node 0 active_anon:128kB inactive_anon:30840kB active_file:72kB inactive_file:68kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34824kB dirty:0kB writeback:0kB shmem:288kB writeback_tmp:0kB kernel_stack:3104kB all_unreclaimable? yes [ 2953.486357] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2953.490843] lowmem_reserve[]: 0 1616 1616 1616 [ 2953.491686] Node 0 DMA32 free:3156kB min:9212kB low:10864kB high:12516kB reserved_highatomic:0KB active_anon:128kB inactive_anon:30840kB active_file:72kB inactive_file:68kB unevictable:0kB writepending:0kB present:2080640kB managed:1660448kB mlocked:0kB pagetables:1376kB bounce:0kB free_pcp:244kB local_pcp:0kB free_cma:0kB [ 2953.496524] lowmem_reserve[]: 0 0 0 0 [ 2953.497238] Node 0 DMA: 1*4kB (U) 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6484kB [ 2953.499571] Node 0 DMA32: 335*4kB (UME) 123*8kB (UME) 44*16kB (UME) 4*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3156kB [ 2953.501928] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2953.503377] 107 total pagecache pages [ 2953.504021] 0 pages in swap cache [ 2953.504621] Swap cache stats: add 0, delete 0, find 0/0 [ 2953.505530] Free swap = 0kB [ 2953.506026] Total swap = 0kB [ 2953.506555] 524158 pages RAM [ 2953.507093] 0 pages HighMem/MovableOnly [ 2953.507876] 105069 pages reserved [ 2953.508628] Unreclaimable slab info: [ 2953.509417] Name Used Total [ 2953.510555] pid_2 67KB 67KB [ 2953.511632] ip6-frags 7KB 7KB [ 2953.512588] fib6_nodes 28KB 28KB [ 2953.513552] ip6_dst_cache 41KB 41KB [ 2953.514533] PINGv6 63KB 63KB [ 2953.515525] RAWv6 157KB 157KB [ 2953.516543] UDPLITEv6 62KB 62KB [ 2953.517525] UDPv6 62KB 62KB [ 2953.518486] request_sock_TCPv6 15KB 15KB [ 2953.519575] TCPv6 62KB 62KB [ 2953.520584] scsi_sense_cache 8KB 8KB [ 2953.521591] sd_ext_cdb 3KB 3KB [ 2953.522588] virtio_scsi_cmd 16KB 16KB [ 2953.523656] sgpool-128 59KB 59KB [ 2953.524627] sgpool-64 63KB 63KB [ 2953.525584] sgpool-32 488KB 488KB [ 2953.526508] sgpool-16 165KB 165KB [ 2953.527473] sgpool-8 135KB 135KB [ 2953.528586] io_kiocb 33KB 33KB [ 2953.529549] mqueue_inode_cache 62KB 62KB [ 2953.530495] nfs_commit_data 15KB 15KB [ 2953.531448] nfs_write_data 47KB 47KB [ 2953.532376] jbd2_inode 7KB 7KB [ 2953.533301] ext4_system_zone 3KB 3KB [ 2953.534237] ext4_io_end_vec 7KB 7KB [ 2953.535162] ext4_bio_post_read_ctx 15KB 15KB [ 2953.536165] kioctx 31KB 31KB [ 2953.537064] aio_kiocb 7KB 7KB [ 2953.537993] bio-2 4KB 4KB [ 2953.538932] fasync_cache 3KB 3KB [ 2953.539918] pid_namespace 7KB 7KB [ 2953.540869] posix_timers_cache 15KB 15KB [ 2953.541814] rpc_buffers 31KB 31KB [ 2953.542738] rpc_tasks 3KB 3KB [ 2953.543692] UNIX 216KB 320KB [ 2953.544617] tcp_bind_bucket 8KB 8KB [ 2953.545543] ip_fib_trie 8KB 8KB [ 2953.546463] ip_fib_alias 15KB 15KB [ 2953.547390] ip_dst_cache 16KB 16KB [ 2953.548456] PING 62KB 62KB [ 2953.549355] RAW 187KB 187KB [ 2953.550247] UDP 316KB 346KB [ 2953.551150] tw_sock_TCP 7KB 7KB [ 2953.552088] request_sock_TCP 7KB 7KB [ 2953.552966] TCP 60KB 60KB [ 2953.553868] hugetlbfs_inode_cache 45KB 45KB [ 2953.554841] bio-1 11KB 11KB [ 2953.555742] eventpoll_pwq 19KB 19KB [ 2953.556642] eventpoll_epi 55KB 55KB [ 2953.557545] inotify_inode_mark 44KB 62KB [ 2953.558459] request_queue 90KB 90KB [ 2953.559362] blkdev_ioc 33KB 33KB [ 2953.560271] bio-0 520KB 520KB [ 2953.561169] biovec-max 531KB 714KB [ 2953.562039] biovec-64 614KB 614KB [ 2953.562933] biovec-16 127KB 127KB [ 2953.563838] user_namespace 15KB 15KB [ 2953.564735] uid_cache 8KB 8KB [ 2953.565637] dmaengine-unmap-2 4KB 4KB [ 2953.566533] audit_buffer 7KB 7KB [ 2953.567441] skbuff_fclone_cache 120KB 120KB [ 2953.568377] skbuff_head_cache 705KB 705KB [ 2953.569270] file_lock_cache 35KB 51KB [ 2953.570172] file_lock_ctx 7KB 7KB [ 2953.571048] fsnotify_mark_connector 60KB 60KB [ 2953.572035] net_namespace 86KB 86KB [ 2953.572926] task_delay_info 119KB 119KB [ 2953.573820] taskstats 46KB 46KB [ 2953.574713] proc_dir_entry 347KB 367KB [ 2953.575623] pde_opener 35KB 35KB [ 2953.576555] seq_file 34KB 41KB [ 2953.577499] sigqueue 106KB 106KB [ 2953.578410] shmem_inode_cache 1252KB 1383KB [ 2953.579512] kernfs_iattrs_cache 219KB 219KB [ 2953.580564] kernfs_node_cache 5135KB 5145KB [ 2953.581601] mnt_cache 181KB 181KB [ 2953.582633] filp 822KB 1372KB [ 2953.583689] names_cache 4403KB 4483KB [ 2953.584737] hashtab_node 274KB 274KB [ 2953.585810] ebitmap_node 1149KB 1149KB [ 2953.586851] avtab_node 4976KB 4976KB [ 2953.587894] avc_node 35KB 35KB [ 2953.588967] lsm_inode_cache 2657KB 3043KB [ 2953.590023] lsm_file_cache 148KB 196KB [ 2953.591057] key_jar 39KB 39KB [ 2953.592114] uts_namespace 15KB 15KB [ 2953.593182] nsproxy 7KB 7KB [ 2953.594265] vm_area_struct 881KB 1056KB [ 2953.595305] fs_cache 52KB 52KB [ 2953.596307] files_cache 270KB 270KB [ 2953.597308] signal_cache 312KB 401KB [ 2953.598339] sighand_cache 233KB 360KB [ 2953.599445] task_struct 990KB 1443KB [ 2953.600554] cred_jar 100KB 192KB [ 2953.601668] anon_vma_chain 222KB 267KB [ 2953.602795] anon_vma 183KB 235KB [ 2953.603907] pid 64KB 71KB [ 2953.604969] Acpi-Operand 223KB 261KB [ 2953.606091] Acpi-ParseExt 27KB 27KB [ 2953.607201] Acpi-Parse 209KB 225KB [ 2953.608308] Acpi-State 86KB 102KB [ 2953.609339] Acpi-Namespace 24KB 24KB [ 2953.610382] numa_policy 3KB 3KB [ 2953.611448] trace_event_file 176KB 176KB [ 2953.612489] ftrace_event_field 280KB 280KB [ 2953.613530] pool_workqueue 32KB 32KB [ 2953.614548] task_group 16KB 16KB [ 2953.615572] mm_struct 283KB 346KB [ 2953.616583] vmap_area 228KB 228KB [ 2953.617607] page->ptl 176KB 240KB [ 2953.618639] kmemleak_scan_area 143KB 143KB [ 2953.620783] kmemleak_object 130436KB 149164KB [ 2953.621909] kmalloc-8k 4544KB 4640KB [ 2953.623004] kmalloc-4k 7464KB 7744KB [ 2953.624115] kmalloc-2k 4092KB 4288KB [ 2953.625218] kmalloc-1k 2648KB 3264KB [ 2953.626313] kmalloc-512 3380KB 4592KB [ 2953.627430] kmalloc-256 1250KB 1272KB [ 2953.628530] kmalloc-192 604KB 604KB [ 2953.629646] kmalloc-128 473KB 520KB [ 2953.630774] kmalloc-96 383KB 612KB [ 2953.631909] kmalloc-64 895KB 1220KB [ 2953.633034] kmalloc-32 775KB 932KB [ 2953.634157] kmalloc-16 314KB 356KB [ 2953.635275] kmalloc-8 308KB 338KB [ 2953.636395] kmem_cache_node 47KB 47KB [ 2953.637507] kmem_cache 75KB 75KB [ 2953.638619] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-journald.service,task=systemd-journal,pid=103,uid=0 [ 2953.642538] Out of memory (oom_kill_allocating_task): Killed process 103 (systemd-journal) total-vm:31940kB, anon-rss:856kB, file-rss:0kB, shmem-rss:4kB, UID:0 pgtables:96kB oom_score_adj:-250 [ 2953.661398] syz-executor.7: page allocation failure: order:0, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz7,mems_allowed=0 [ 2953.664930] CPU: 1 PID: 15393 Comm: syz-executor.7 Not tainted 5.10.235 #1 [ 2953.666538] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2953.668439] Call Trace: [ 2953.669052] dump_stack+0x107/0x167 [ 2953.669902] warn_alloc.cold+0x95/0x18a [ 2953.670832] ? zone_watermark_ok_safe+0x260/0x260 [ 2953.671960] ? queue_oom_reaper+0x86/0x1e0 [ 2953.672973] ? wait_for_completion_io+0x270/0x270 [ 2953.674025] __alloc_pages_slowpath.constprop.0+0x1c3d/0x2170 [ 2953.675606] ? lock_acquire+0xb7/0x470 [ 2953.676636] ? warn_alloc+0x190/0x190 [ 2953.677664] __alloc_pages_nodemask+0x51d/0x600 [ 2953.678864] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2953.680248] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2953.681667] ? policy_node+0xab/0x140 [ 2953.682575] ? __sanitizer_cov_trace_pc+0xd/0x60 [ 2953.683744] alloc_pages_current+0x187/0x280 [ 2953.684866] relay_open_buf.part.0+0x2a5/0xc00 [ 2953.686042] relay_open+0x531/0xa10 [ 2953.686984] do_blk_trace_setup+0x4cf/0xc10 [ 2953.688097] ? _copy_from_user+0xfb/0x1b0 [ 2953.689121] __blk_trace_setup+0xca/0x180 [ 2953.690249] ? do_blk_trace_setup+0xc10/0xc10 [ 2953.691405] blk_trace_ioctl+0x155/0x290 [ 2953.692516] ? blk_add_trace_bio_remap+0x5d0/0x5d0 [ 2953.693859] ? do_vfs_ioctl+0x283/0x10d0 [ 2953.694972] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2953.696445] ? generic_block_fiemap+0x60/0x60 [ 2953.697681] ? lock_downgrade+0x6d0/0x6d0 [ 2953.698837] blkdev_ioctl+0xc1/0x710 [ 2953.699881] ? blkdev_common_ioctl+0x1930/0x1930 [ 2953.701186] ? selinux_file_ioctl+0xb6/0x270 [ 2953.702413] block_ioctl+0xf9/0x140 [ 2953.703424] ? blkdev_read_iter+0x1c0/0x1c0 [ 2953.704614] __x64_sys_ioctl+0x19a/0x210 [ 2953.705741] do_syscall_64+0x33/0x40 [ 2953.706766] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2953.708184] RIP: 0033:0x7fc7b3760b19 [ 2953.709199] Code: Unable to access opcode bytes at RIP 0x7fc7b3760aef. [ 2953.710986] RSP: 002b:00007fc7b0cd6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2953.713075] RAX: ffffffffffffffda RBX: 00007fc7b3873f60 RCX: 00007fc7b3760b19 [ 2953.715020] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 0000000000000003 [ 2953.716987] RBP: 00007fc7b37baf6d R08: 0000000000000000 R09: 0000000000000000 [ 2953.718932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2953.720902] R13: 00007ffe48d6953f R14: 00007fc7b0cd6300 R15: 0000000000022000 [ 2953.723006] Mem-Info: [ 2953.723769] active_anon:32 inactive_anon:7710 isolated_anon:0 [ 2953.723769] active_file:18 inactive_file:17 isolated_file:0 [ 2953.723769] unevictable:0 dirty:0 writeback:0 [ 2953.723769] slab_reclaimable:7307 slab_unreclaimable:56867 [ 2953.723769] mapped:8706 shmem:72 pagetables:344 bounce:0 [ 2953.723769] free:2410 free_pcp:61 free_cma:0 [ 2953.731791] Node 0 active_anon:128kB inactive_anon:30840kB active_file:72kB inactive_file:68kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34824kB dirty:0kB writeback:0kB shmem:288kB writeback_tmp:0kB kernel_stack:3104kB all_unreclaimable? yes [ 2953.737357] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2953.743288] lowmem_reserve[]: 0 1616 1616 1616 [ 2953.744432] Node 0 DMA32 free:3156kB min:9212kB low:10864kB high:12516kB reserved_highatomic:0KB active_anon:128kB inactive_anon:30840kB active_file:72kB inactive_file:68kB unevictable:0kB writepending:0kB present:2080640kB managed:1660448kB mlocked:0kB pagetables:1376kB bounce:0kB free_pcp:240kB local_pcp:240kB free_cma:0kB [ 2953.750808] lowmem_reserve[]: 0 0 0 0 [ 2953.751726] Node 0 DMA: 1*4kB (U) 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6484kB [ 2953.754746] Node 0 DMA32: 335*4kB (UME) 123*8kB (UME) 44*16kB (UME) 4*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3156kB [ 2953.757884] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2953.759858] 107 total pagecache pages [ 2953.760770] 0 pages in swap cache [ 2953.761618] Swap cache stats: add 0, delete 0, find 0/0 [ 2953.762875] Free swap = 0kB [ 2953.763623] Total swap = 0kB [ 2953.764359] 524158 pages RAM [ 2953.765105] 0 pages HighMem/MovableOnly [ 2953.766020] 105069 pages reserved [ 2953.771489] systemd-journal (103) used greatest stack depth: 23456 bytes left [ 2953.854764] systemd[1]: systemd-journald.service: Main process exited, code=killed, status=9/KILL [ 2953.860717] systemd[1]: systemd-journald.service: Failed with result 'oom-kill'. [ 2953.887548] systemd[1]: systemd-journald.service: Consumed 6.252s CPU time. [ 2953.892099] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 2953.927284] systemd[1]: Stopping Flush Journal to Persistent Storage... [ 2954.017414] systemd[1]: Started Load/Save RF Kill Switch Status. [ 2954.111096] systemd[1]: Stopped target Bluetooth. [ 2954.173191] systemd[1]: systemd-journal-flush.service: Succeeded. [ 2954.179505] systemd[1]: Stopped Flush Journal to Persistent Storage. [ 2954.180839] systemd[1]: Stopped Journal Service. [ 2954.183874] systemd[1]: systemd-journald.service: Consumed 6.252s CPU time. [ 2954.206649] systemd[1]: Starting Journal Service... [ 2954.279196] systemd[1]: Started OpenBSD Secure Shell server. [ 2954.375992] systemd-journald[15440]: File /var/log/journal/7e681e5076844de4a5cfa8606a84b008/system.journal corrupted or uncleanly shut down, renaming and replacing. [ 2954.998297] systemd[1]: Started Journal Service. [ 2955.101584] systemd-journald[15440]: Received client request to flush runtime journal. [ 2959.239681] systemd-rfkill (15430) used greatest stack depth: 22960 bytes left VM DIAGNOSIS: 20:21:32 Registers: info registers vcpu 0 RAX=fffffbfff0d0d8dd RBX=fffffbfff0d0d8dd RCX=ffffffff8126ac65 RDX=fffffbfff0d0d8dd RSI=0000000000000008 RDI=ffffffff8686c6e0 RBP=fffffbfff0d0d8dc RSP=ffff88800c2e75b8 R8 =0000000000000000 R9 =ffffffff8686c6e7 R10=fffffbfff0d0d8dc R11=0000000000000001 R12=ffff88800bec3df0 R13=0000000000000033 R14=ffff88800bec3e10 R15=0000000000000200 RIP=ffffffff816cc1d3 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055b6aa501c1c CR3=0000000004e26000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=6c65732d6461657268742f636f72702f XMM01=65746165726373662f727474612f666c XMM02=00000000000000000000000000000000 XMM03=00656369767265732e6873733a6e6f69 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=00000000000000000000000000000000 XMM06=0a33316539303538335239333637344e XMM07=00000000000000000000000000000000 XMM08=2f727474612f666c65732d6461657268 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000200000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=000000000000000b RBX=00000000000002fc RCX=ffffffff8126ee2e RDX=1ffff11002fd612d RSI=0000000000000008 RDI=ffffffff8686c738 RBP=0000000000000000 RSP=ffff888017467488 R8 =0000000000000000 R9 =0000000000000001 R10=0000000000000000 R11=0000000000000001 R12=ffff888017eb0000 R13=ffff888017eb0970 R14=0000000000000001 R15=0000000000000000 RIP=ffffffff8126f256 RFL=00000013 [----A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fa0857d3900 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fa0860b95e0 CR3=00000000151a2000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=000000000000000000000000000000ff XMM02=000000000000000000000000000000ff XMM03=66207463656e6e6f6373696420646576 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0d0c0f0e09080b0a0504070601000302 XMM07=00000000000000000000000000000000 XMM08=736f6c63206e6f697463656e6e6f4300 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000