&(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:37 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:37 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 03:51:37 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2171.513609][T28652] loop4: detected capacity change from 0 to 16383 [ 2171.551912][T28652] EXT4-fs (loop4): bad geometry: block count 65283 exceeds size of device (8191 blocks) 03:51:37 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001fff000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:37 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:37 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:37 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2171.753751][T28705] loop4: detected capacity change from 0 to 16383 03:51:37 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:37 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2171.801872][T28705] EXT4-fs (loop4): bad geometry: block count 65311 exceeds size of device (8191 blocks) 03:51:37 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:37 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2171.918942][T28732] loop4: detected capacity change from 0 to 16383 03:51:37 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2171.979558][T28732] EXT4-fs (loop4): bad geometry: block count 65311 exceeds size of device (8191 blocks) 03:51:37 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:37 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:37 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:37 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003fff000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:37 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:38 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2172.113574][T28769] loop4: detected capacity change from 0 to 16383 [ 2172.144038][T28769] EXT4-fs (loop4): bad geometry: block count 65343 exceeds size of device (8191 blocks) 03:51:38 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:38 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:38 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2172.269049][T28795] loop4: detected capacity change from 0 to 16383 [ 2172.317592][T28795] EXT4-fs (loop4): bad geometry: block count 65343 exceeds size of device (8191 blocks) 03:51:38 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:38 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:38 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000000000219000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) [ 2172.528636][T28830] loop4: detected capacity change from 0 to 16383 [ 2172.555464][T28830] EXT4-fs (loop4): bad geometry: block count 33554432 exceeds size of device (8191 blocks) 03:51:38 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:38 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:38 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:38 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:38 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2172.648615][T28843] loop4: detected capacity change from 0 to 16383 [ 2172.664276][T28843] EXT4-fs (loop4): bad geometry: block count 33554432 exceeds size of device (8191 blocks) 03:51:38 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:38 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:38 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000003000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:38 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2172.802429][T28870] loop4: detected capacity change from 0 to 16383 [ 2172.845854][T28870] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2172.856430][T28870] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:51:38 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:38 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:38 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2172.952771][T28870] EXT4-fs (loop4): mount failed [ 2173.029273][T28905] loop4: detected capacity change from 0 to 16383 [ 2173.080240][T28905] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2173.090794][T28905] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 2173.127457][T28905] EXT4-fs (loop4): mount failed 03:51:39 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:39 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:39 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:39 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000004000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:39 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2173.276048][T28932] loop4: detected capacity change from 0 to 16383 03:51:39 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:39 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:39 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2173.366650][T28932] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2173.377215][T28932] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 2173.392747][T28932] EXT4-fs (loop4): mount failed 03:51:39 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2173.446116][T28949] loop4: detected capacity change from 0 to 16383 03:51:39 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:39 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', 0x0) [ 2173.502499][T28949] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2173.513112][T28949] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:51:39 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2173.578678][T28949] EXT4-fs (loop4): mount failed 03:51:39 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:39 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:39 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:39 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000005000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:39 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2173.712317][T28999] loop4: detected capacity change from 0 to 16383 [ 2173.756579][T28999] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2173.767148][T28999] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:51:39 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', 0x0) 03:51:39 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:39 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2173.921640][T28999] EXT4-fs (loop4): mount failed 03:51:39 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:39 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2173.978170][T29029] loop4: detected capacity change from 0 to 16383 03:51:39 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:39 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2174.066437][T29029] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2174.077020][T29029] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 2174.194812][T29029] EXT4-fs (loop4): mount failed 03:51:40 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:40 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:40 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', 0x0) 03:51:40 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000006000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:40 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:40 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:40 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:40 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:40 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2174.380953][T29100] loop4: detected capacity change from 0 to 16383 03:51:40 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2174.465438][T29100] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2174.476107][T29100] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:51:40 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2174.517244][T29100] EXT4-fs (loop4): mount failed 03:51:40 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:40 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2174.575960][T29137] loop4: detected capacity change from 0 to 16383 03:51:40 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2174.664442][T29137] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2174.675012][T29137] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:51:40 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2174.771813][T29137] EXT4-fs (loop4): mount failed 03:51:40 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000007000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:40 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:40 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:40 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:40 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:40 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:40 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2174.948068][T29210] loop4: detected capacity change from 0 to 16383 03:51:40 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2175.016596][T29210] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2175.027156][T29210] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 2175.042531][T29210] EXT4-fs (loop4): mount failed 03:51:40 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000008000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:40 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:40 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2175.179495][T29248] loop4: detected capacity change from 0 to 16383 03:51:41 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2175.234115][T29248] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2175.244721][T29248] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:51:41 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:41 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:41 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2175.293493][T29248] EXT4-fs (loop4): mount failed 03:51:41 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:41 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:41 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2175.389076][T29289] loop4: detected capacity change from 0 to 16383 [ 2175.463523][T29289] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2175.474113][T29289] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:51:41 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2175.564427][T29289] EXT4-fs (loop4): mount failed 03:51:41 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:41 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000009000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:41 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:41 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:41 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:41 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2175.763747][T29362] loop4: detected capacity change from 0 to 16383 03:51:41 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2175.810328][T29362] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2175.820892][T29362] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:51:41 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:41 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:41 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:41 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2175.935094][T29362] EXT4-fs (loop4): mount failed 03:51:41 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2176.003164][T29408] loop4: detected capacity change from 0 to 16383 03:51:41 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:41 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:41 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, 0x0, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:41 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:41 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000a000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:41 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2176.052878][T29408] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2176.063515][T29408] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 2176.084781][T29408] EXT4-fs (loop4): mount failed 03:51:42 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, 0x0, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:42 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:42 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2176.181315][T29439] loop4: detected capacity change from 0 to 16383 03:51:42 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:42 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, 0x0, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2176.251440][T29439] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2176.262012][T29439] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:51:42 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:42 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:42 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:42 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2176.350735][T29439] EXT4-fs (loop4): mount failed 03:51:42 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2176.414635][T29500] loop4: detected capacity change from 0 to 16383 [ 2176.486302][T29500] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2176.496867][T29500] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 2176.582435][T29500] EXT4-fs (loop4): mount failed 03:51:42 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000f000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:42 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:42 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:42 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:42 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:42 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:42 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:42 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:42 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:42 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:42 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2176.759430][T29553] loop4: detected capacity change from 0 to 16383 [ 2176.824475][T29553] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2176.835090][T29553] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:51:42 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2176.879241][T29553] EXT4-fs (loop4): mount failed [ 2176.922936][T29593] loop4: detected capacity change from 0 to 16383 [ 2176.943853][T29593] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2176.954407][T29593] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 2176.973075][T29593] EXT4-fs (loop4): mount failed 03:51:42 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000010000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:42 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:42 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:42 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:42 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:42 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:42 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:42 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:42 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:42 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2177.077468][T29631] loop4: detected capacity change from 0 to 16383 03:51:42 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2177.156143][T29631] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2177.166718][T29631] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:51:43 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2177.224675][T29631] EXT4-fs (loop4): mount failed [ 2177.305758][T29701] loop4: detected capacity change from 0 to 16383 [ 2177.315492][T29701] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2177.326026][T29701] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 2177.340581][T29701] EXT4-fs (loop4): mount failed 03:51:43 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000012000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:43 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:43 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:43 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:43 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:43 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:43 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:43 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:43 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:43 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2177.452285][T29731] loop4: detected capacity change from 0 to 16383 03:51:43 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2177.560706][T29731] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2177.571288][T29731] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:51:43 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2177.659009][T29731] EXT4-fs (loop4): mount failed [ 2177.713318][T29794] loop4: detected capacity change from 0 to 16383 [ 2177.723783][T29794] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2177.734382][T29794] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 2177.748793][T29794] EXT4-fs (loop4): mount failed 03:51:43 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000017000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:43 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:43 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:43 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:43 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:43 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:43 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2177.827513][T29813] loop4: detected capacity change from 0 to 16383 03:51:43 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:43 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2177.882324][T29813] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2177.892874][T29813] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:51:43 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:43 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2177.952838][T29813] EXT4-fs (loop4): mount failed 03:51:43 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) [ 2178.013399][T29867] loop4: detected capacity change from 0 to 16383 [ 2178.084943][T29867] EXT4-fs error (device loop4): ext4_quota_enable:6438: comm syz-executor.4: Bad quota inode # 3 [ 2178.095649][T29867] EXT4-fs warning (device loop4): ext4_enable_quotas:6478: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:51:44 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000002e000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) [ 2178.148836][T29867] EXT4-fs (loop4): mount failed 03:51:44 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:44 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) 03:51:44 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:44 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:44 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:44 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) 03:51:44 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:44 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:44 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:44 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2178.276648][T29938] loop4: detected capacity change from 0 to 16383 03:51:44 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) [ 2178.327236][T29938] EXT4-fs (loop4): bad geometry: block count 11776 exceeds size of device (8191 blocks) [ 2178.426545][T29981] loop4: detected capacity change from 0 to 16383 [ 2178.484177][T29981] EXT4-fs (loop4): bad geometry: block count 11776 exceeds size of device (8191 blocks) 03:51:44 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:44 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:44 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000032000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:44 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) 03:51:44 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:44 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:44 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:44 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:44 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:44 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2178.588360][T30010] loop4: detected capacity change from 0 to 16383 03:51:44 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) 03:51:44 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2178.657920][T30010] EXT4-fs (loop4): bad geometry: block count 12800 exceeds size of device (8191 blocks) 03:51:44 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:44 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2178.757863][T30072] loop4: detected capacity change from 0 to 16383 [ 2178.796858][T30072] EXT4-fs (loop4): bad geometry: block count 12800 exceeds size of device (8191 blocks) 03:51:44 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000051000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:44 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:44 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:44 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:44 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:44 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:44 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:44 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:44 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:44 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2179.042330][T30136] loop4: detected capacity change from 0 to 16383 03:51:44 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:44 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2179.086892][T30136] EXT4-fs (loop4): bad geometry: block count 20736 exceeds size of device (8191 blocks) [ 2179.213773][T30179] loop4: detected capacity change from 0 to 16383 [ 2179.238775][T30179] EXT4-fs (loop4): bad geometry: block count 20736 exceeds size of device (8191 blocks) 03:51:45 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000064000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:45 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:45 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:45 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:45 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:45 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:45 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2179.370652][T30198] loop4: detected capacity change from 0 to 16383 [ 2179.397883][T30198] EXT4-fs (loop4): bad geometry: block count 25600 exceeds size of device (8191 blocks) 03:51:45 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:45 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:45 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2179.509904][T30228] loop4: detected capacity change from 0 to 16383 03:51:45 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2179.562615][T30228] EXT4-fs (loop4): bad geometry: block count 25600 exceeds size of device (8191 blocks) 03:51:45 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:45 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000e010019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:45 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:45 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:45 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:45 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2179.761638][T30272] loop4: detected capacity change from 0 to 16383 [ 2179.799476][T30272] EXT4-fs (loop4): bad geometry: block count 69120 exceeds size of device (8191 blocks) 03:51:45 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000083030019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:45 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2179.932082][T30293] loop4: detected capacity change from 0 to 16383 03:51:45 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2179.998432][T30293] EXT4-fs (loop4): bad geometry: block count 230144 exceeds size of device (8191 blocks) 03:51:45 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:45 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:45 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc3472070000000000000081"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2180.118866][T30314] loop4: detected capacity change from 0 to 16383 03:51:46 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc3472070000000000000081"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:46 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2180.193700][T30314] EXT4-fs (loop4): bad geometry: block count 230144 exceeds size of device (8191 blocks) 03:51:46 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc3472070000000000000081"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:46 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:46 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000084030019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:46 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:46 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:46 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2180.417920][T30377] loop4: detected capacity change from 0 to 16383 [ 2180.444285][T30377] EXT4-fs (loop4): bad geometry: block count 230400 exceeds size of device (8191 blocks) 03:51:46 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2180.532437][T30396] loop4: detected capacity change from 0 to 16383 [ 2180.595011][T30396] EXT4-fs (loop4): bad geometry: block count 230400 exceeds size of device (8191 blocks) 03:51:46 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:46 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:46 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, 0x0, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:46 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:46 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, 0x0, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:46 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000f6030019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:46 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:46 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) [ 2180.835079][T30452] loop4: detected capacity change from 0 to 16383 [ 2180.867988][T30452] EXT4-fs (loop4): bad geometry: block count 259584 exceeds size of device (8191 blocks) 03:51:46 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:46 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:46 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, 0x0, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:46 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) 03:51:46 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2180.945904][T30472] loop4: detected capacity change from 0 to 16383 03:51:46 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) 03:51:46 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2180.993831][T30472] EXT4-fs (loop4): bad geometry: block count 259584 exceeds size of device (8191 blocks) 03:51:46 executing program 3: io_uring_setup(0x0, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:46 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000f7030019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:46 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2181.152894][T30517] loop4: detected capacity change from 0 to 16383 03:51:47 executing program 3: io_uring_setup(0x0, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:47 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2181.197774][T30517] EXT4-fs (loop4): bad geometry: block count 259840 exceeds size of device (8191 blocks) 03:51:47 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:47 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:47 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834f"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:47 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:47 executing program 3: io_uring_setup(0x0, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2181.307598][T30557] loop4: detected capacity change from 0 to 16383 [ 2181.346774][T30557] EXT4-fs (loop4): bad geometry: block count 259840 exceeds size of device (8191 blocks) 03:51:47 executing program 3: io_uring_setup(0x45db, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:47 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834f"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:47 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:47 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000f9030019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:47 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:47 executing program 3: io_uring_setup(0x45db, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2181.526591][T30616] loop4: detected capacity change from 0 to 16383 03:51:47 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834f"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2181.568916][T30616] EXT4-fs (loop4): bad geometry: block count 260352 exceeds size of device (8191 blocks) 03:51:47 executing program 5: io_uring_setup(0x0, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:47 executing program 3: io_uring_setup(0x45db, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:47 executing program 2: io_uring_setup(0x0, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:47 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:47 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2181.703741][T30662] loop4: detected capacity change from 0 to 16383 03:51:47 executing program 2: io_uring_setup(0x0, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:47 executing program 5: io_uring_setup(0x0, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:47 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2181.760594][T30662] EXT4-fs (loop4): bad geometry: block count 260352 exceeds size of device (8191 blocks) 03:51:47 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000fa030019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:47 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:47 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:47 executing program 2: io_uring_setup(0x0, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:47 executing program 5: io_uring_setup(0x0, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:47 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:47 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:47 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2181.951002][T30732] loop4: detected capacity change from 0 to 16383 03:51:47 executing program 2: io_uring_setup(0x45db, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:47 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2182.010887][T30732] EXT4-fs (loop4): bad geometry: block count 260608 exceeds size of device (8191 blocks) 03:51:47 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:47 executing program 2: io_uring_setup(0x45db, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2182.140599][T30798] loop4: detected capacity change from 0 to 16383 [ 2182.171627][T30798] EXT4-fs (loop4): bad geometry: block count 260608 exceeds size of device (8191 blocks) 03:51:48 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000fb030019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:48 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:48 executing program 2: io_uring_setup(0x45db, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:48 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2182.321057][T30825] loop4: detected capacity change from 0 to 16383 [ 2182.342836][T30825] EXT4-fs (loop4): bad geometry: block count 260864 exceeds size of device (8191 blocks) 03:51:48 executing program 5: io_uring_setup(0x45db, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:48 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:48 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:48 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:48 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2182.469701][T30844] loop4: detected capacity change from 0 to 16383 03:51:48 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:48 executing program 5: io_uring_setup(0x45db, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2182.544185][T30844] EXT4-fs (loop4): bad geometry: block count 260864 exceeds size of device (8191 blocks) 03:51:48 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:48 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000fc030019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:48 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:48 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:48 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:48 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:48 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:48 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2182.764518][T30931] loop4: detected capacity change from 0 to 16383 03:51:48 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2182.831611][T30931] EXT4-fs (loop4): bad geometry: block count 261120 exceeds size of device (8191 blocks) 03:51:48 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:48 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:48 executing program 5: io_uring_setup(0x45db, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:48 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2182.953648][T30971] loop4: detected capacity change from 0 to 16383 [ 2182.989911][T30971] EXT4-fs (loop4): bad geometry: block count 261120 exceeds size of device (8191 blocks) 03:51:48 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000fd030019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:48 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:48 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:48 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:48 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:48 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2183.125544][T31017] loop4: detected capacity change from 0 to 16383 [ 2183.163749][T31017] EXT4-fs (loop4): bad geometry: block count 261376 exceeds size of device (8191 blocks) 03:51:49 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:49 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:49 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:49 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000014040019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:49 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:49 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:49 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:49 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2183.319058][T31072] loop4: detected capacity change from 0 to 16383 03:51:49 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2183.390662][T31072] EXT4-fs (loop4): bad geometry: block count 267264 exceeds size of device (8191 blocks) 03:51:49 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2183.500788][T31120] loop4: detected capacity change from 0 to 16383 03:51:49 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:49 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:49 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:49 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:49 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2183.542622][T31120] EXT4-fs (loop4): bad geometry: block count 267264 exceeds size of device (8191 blocks) 03:51:49 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000ff1f0019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:49 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:49 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2183.719199][T31166] loop4: detected capacity change from 0 to 16383 03:51:49 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:49 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2183.770769][T31166] EXT4-fs (loop4): bad geometry: block count 2096896 exceeds size of device (8191 blocks) 03:51:49 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2183.914386][T31211] loop4: detected capacity change from 0 to 16383 03:51:49 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2183.956676][T31211] EXT4-fs (loop4): bad geometry: block count 2096896 exceeds size of device (8191 blocks) 03:51:49 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:49 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:49 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:49 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x0, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:49 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000008a260019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:49 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:49 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:50 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2184.163872][T31244] loop4: detected capacity change from 0 to 16383 03:51:50 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:50 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x0, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:50 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2184.215939][T31244] EXT4-fs (loop4): bad geometry: block count 2525696 exceeds size of device (8191 blocks) 03:51:50 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:50 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000b2a0019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:50 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x0, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:50 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:50 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:50 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:50 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2184.354653][T31308] loop4: detected capacity change from 0 to 16383 [ 2184.406981][T31308] EXT4-fs (loop4): bad geometry: block count 2755328 exceeds size of device (8191 blocks) 03:51:50 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc3472070000000000000081"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:50 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:50 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:50 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc3472070000000000000081"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2184.510475][T31375] loop4: detected capacity change from 0 to 16383 [ 2184.547526][T31375] EXT4-fs (loop4): bad geometry: block count 2755328 exceeds size of device (8191 blocks) 03:51:50 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:50 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000ed3f0019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:50 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:50 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc3472070000000000000081"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2184.695550][T31423] loop4: detected capacity change from 0 to 16383 03:51:50 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:50 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:50 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:50 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:50 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2184.742573][T31423] EXT4-fs (loop4): bad geometry: block count 4189440 exceeds size of device (8191 blocks) 03:51:50 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2184.808943][T31451] loop4: detected capacity change from 0 to 16383 [ 2184.834281][T31451] EXT4-fs (loop4): bad geometry: block count 4189440 exceeds size of device (8191 blocks) 03:51:50 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:50 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:50 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:50 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000ef3f0019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:50 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:50 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:50 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:50 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:50 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2185.115478][T31540] loop4: detected capacity change from 0 to 16383 03:51:51 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:51 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2185.164506][T31540] EXT4-fs (loop4): bad geometry: block count 4189952 exceeds size of device (8191 blocks) 03:51:51 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:51 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2185.270080][T31580] loop4: detected capacity change from 0 to 16383 03:51:51 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:51 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834f"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2185.330420][T31580] EXT4-fs (loop4): bad geometry: block count 4189952 exceeds size of device (8191 blocks) 03:51:51 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000f13f0019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:51 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:51 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:51 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:51 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834f"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:51 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2185.549060][T31666] loop4: detected capacity change from 0 to 16383 [ 2185.593990][T31674] ================================================================== [ 2185.602103][T31674] BUG: KCSAN: data-race in compact_zone / compact_zone [ 2185.608949][T31674] [ 2185.611265][T31674] write to 0xffff88823fffad90 of 8 bytes by task 31675 on cpu 0: [ 2185.618975][T31674] compact_zone+0x1446/0x1ce0 [ 2185.623655][T31674] try_to_compact_pages+0x317/0x840 [ 2185.628849][T31674] __alloc_pages_direct_compact+0x61/0x330 [ 2185.634656][T31674] __alloc_pages_slowpath+0x29a/0xb90 [ 2185.640020][T31674] __alloc_pages+0x25b/0x320 [ 2185.644606][T31674] alloc_pages+0x2e8/0x340 [ 2185.645687][T31666] EXT4-fs (loop4): bad geometry: block count 4190464 exceeds size of device (8191 blocks) [ 2185.649045][T31674] __get_free_pages+0x8/0x30 [ 2185.649065][T31674] io_uring_create+0x904/0x1940 [ 2185.668355][T31674] __x64_sys_io_uring_setup+0xe1/0x120 [ 2185.673816][T31674] do_syscall_64+0x3d/0x90 [ 2185.678226][T31674] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2185.684119][T31674] [ 2185.686431][T31674] read to 0xffff88823fffad90 of 8 bytes by task 31674 on cpu 1: 03:51:51 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2185.694065][T31674] compact_zone+0x1422/0x1ce0 [ 2185.698743][T31674] try_to_compact_pages+0x317/0x840 [ 2185.703944][T31674] __alloc_pages_direct_compact+0x61/0x330 [ 2185.709834][T31674] __alloc_pages_slowpath+0x5d4/0xb90 [ 2185.715202][T31674] __alloc_pages+0x25b/0x320 [ 2185.719878][T31674] alloc_pages+0x2e8/0x340 [ 2185.724290][T31674] __get_free_pages+0x8/0x30 [ 2185.728869][T31674] io_uring_create+0x9f7/0x1940 [ 2185.733719][T31674] __x64_sys_io_uring_setup+0xe1/0x120 [ 2185.739178][T31674] do_syscall_64+0x3d/0x90 03:51:51 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834f"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:51 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:51 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2185.743588][T31674] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2185.749473][T31674] [ 2185.751783][T31674] value changed: 0x00000000001b3c00 -> 0x00000000001b4e00 [ 2185.758888][T31674] [ 2185.761196][T31674] Reported by Kernel Concurrency Sanitizer on: [ 2185.767328][T31674] CPU: 1 PID: 31674 Comm: syz-executor.5 Not tainted 5.14.0-rc4-syzkaller #0 [ 2185.776079][T31674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2185.786128][T31674] ================================================================== [ 2185.848334][T31706] loop4: detected capacity change from 0 to 16383 03:51:51 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2185.891963][T31706] EXT4-fs (loop4): bad geometry: block count 4190464 exceeds size of device (8191 blocks) 03:51:51 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:51 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000f33f0019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:51 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:51 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2186.031675][T31763] loop4: detected capacity change from 0 to 16383 [ 2186.076811][T31763] EXT4-fs (loop4): bad geometry: block count 4190976 exceeds size of device (8191 blocks) 03:51:51 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:51 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:52 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2186.234201][T31805] loop4: detected capacity change from 0 to 16383 03:51:52 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:52 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2186.298087][T31805] EXT4-fs (loop4): bad geometry: block count 4190976 exceeds size of device (8191 blocks) 03:51:52 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:52 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:52 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:52 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:52 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000f53f0019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:52 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:52 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:52 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2186.791973][T31885] loop4: detected capacity change from 0 to 16383 [ 2186.824885][T31885] EXT4-fs (loop4): bad geometry: block count 4191488 exceeds size of device (8191 blocks) 03:51:52 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2187.027472][T31933] loop4: detected capacity change from 0 to 16383 [ 2187.066493][T31933] EXT4-fs (loop4): bad geometry: block count 4191488 exceeds size of device (8191 blocks) 03:51:52 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:52 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:53 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000fb3f0019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:53 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:53 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:53 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2187.341922][T31965] loop4: detected capacity change from 0 to 16383 [ 2187.371898][T31965] EXT4-fs (loop4): bad geometry: block count 4193024 exceeds size of device (8191 blocks) 03:51:53 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:53 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:53 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2187.541575][T32006] loop4: detected capacity change from 0 to 16383 [ 2187.552595][T32006] EXT4-fs (loop4): bad geometry: block count 4193024 exceeds size of device (8191 blocks) 03:51:53 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:53 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000fd3f0019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:53 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:53 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:53 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2187.889408][T32059] loop4: detected capacity change from 0 to 16383 [ 2187.921319][T32059] EXT4-fs (loop4): bad geometry: block count 4193536 exceeds size of device (8191 blocks) 03:51:53 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:53 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:53 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:53 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:53 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:54 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2188.189462][T32076] loop4: detected capacity change from 0 to 16383 [ 2188.216117][T32076] EXT4-fs (loop4): bad geometry: block count 4193536 exceeds size of device (8191 blocks) 03:51:54 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000ff3f0019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:54 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:54 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:54 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:54 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:54 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2188.598976][T32179] loop4: detected capacity change from 0 to 16383 [ 2188.622402][T32179] EXT4-fs (loop4): bad geometry: block count 4194048 exceeds size of device (8191 blocks) 03:51:54 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:54 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2188.765079][T32219] loop4: detected capacity change from 0 to 16383 03:51:54 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:54 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2188.820646][T32219] EXT4-fs (loop4): bad geometry: block count 4194048 exceeds size of device (8191 blocks) 03:51:54 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000001fff0019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:54 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:54 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:55 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2189.217217][T32277] loop4: detected capacity change from 0 to 16383 [ 2189.251180][T32277] EXT4-fs (loop4): bad geometry: block count 16719616 exceeds size of device (8191 blocks) 03:51:55 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:55 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2189.393166][T32298] loop4: detected capacity change from 0 to 16383 [ 2189.413342][T32298] EXT4-fs (loop4): bad geometry: block count 16719616 exceeds size of device (8191 blocks) 03:51:55 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:55 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:55 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:55 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:55 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002020019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:55 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2189.717303][T32348] loop4: detected capacity change from 0 to 16383 03:51:55 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2189.765130][T32348] EXT4-fs (loop4): bad geometry: block count 131584 exceeds size of device (8191 blocks) 03:51:55 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:55 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2189.954389][T32396] loop4: detected capacity change from 0 to 16383 [ 2189.965402][T32396] EXT4-fs (loop4): bad geometry: block count 131584 exceeds size of device (8191 blocks) 03:51:55 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:55 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:55 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002030019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:56 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:56 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:56 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2190.360750][T32427] loop4: detected capacity change from 0 to 16383 [ 2190.382954][T32427] EXT4-fs (loop4): bad geometry: block count 197120 exceeds size of device (8191 blocks) 03:51:56 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:56 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:56 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:56 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:56 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2190.696323][T32444] loop4: detected capacity change from 0 to 16383 [ 2190.713475][T32444] EXT4-fs (loop4): bad geometry: block count 197120 exceeds size of device (8191 blocks) 03:51:56 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:56 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:56 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002040019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:56 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:56 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2191.001015][T32539] loop4: detected capacity change from 0 to 16383 03:51:56 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:56 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:56 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:56 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2191.058711][T32539] EXT4-fs (loop4): bad geometry: block count 262656 exceeds size of device (8191 blocks) 03:51:56 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:57 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:57 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2191.237443][T32580] loop4: detected capacity change from 0 to 16383 [ 2191.262587][T32580] EXT4-fs (loop4): bad geometry: block count 262656 exceeds size of device (8191 blocks) 03:51:57 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:57 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:57 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002050019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:57 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:57 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:57 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2191.504604][T32643] ================================================================== [ 2191.512885][T32643] BUG: KCSAN: data-race in compact_zone / compact_zone [ 2191.519995][T32643] [ 2191.522306][T32643] write to 0xffff88823fffad90 of 8 bytes by task 32641 on cpu 0: [ 2191.530010][T32643] compact_zone+0x1446/0x1ce0 [ 2191.534942][T32643] try_to_compact_pages+0x317/0x840 [ 2191.540132][T32643] __alloc_pages_direct_compact+0x61/0x330 [ 2191.545937][T32643] __alloc_pages_slowpath+0x29a/0xb90 [ 2191.551305][T32643] __alloc_pages+0x25b/0x320 [ 2191.555888][T32643] alloc_pages+0x2e8/0x340 [ 2191.560292][T32643] __get_free_pages+0x8/0x30 [ 2191.564874][T32643] io_uring_create+0x9f7/0x1940 [ 2191.569712][T32643] __x64_sys_io_uring_setup+0xe1/0x120 [ 2191.575165][T32643] do_syscall_64+0x3d/0x90 [ 2191.579578][T32643] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2191.585563][T32643] [ 2191.587871][T32643] read to 0xffff88823fffad90 of 8 bytes by task 32643 on cpu 1: [ 2191.595501][T32643] compact_zone+0x1422/0x1ce0 [ 2191.600169][T32643] try_to_compact_pages+0x317/0x840 [ 2191.605370][T32643] __alloc_pages_direct_compact+0x61/0x330 [ 2191.611175][T32643] __alloc_pages_slowpath+0x5d4/0xb90 [ 2191.616537][T32643] __alloc_pages+0x25b/0x320 [ 2191.621141][T32643] alloc_pages+0x2e8/0x340 [ 2191.625552][T32643] __get_free_pages+0x8/0x30 [ 2191.630135][T32643] io_uring_create+0x904/0x1940 [ 2191.634977][T32643] __x64_sys_io_uring_setup+0xe1/0x120 [ 2191.640431][T32643] do_syscall_64+0x3d/0x90 [ 2191.644838][T32643] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2191.650897][T32643] 03:51:57 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2191.653203][T32643] value changed: 0x00000000001cf200 -> 0x00000000001d0000 [ 2191.660296][T32643] [ 2191.662611][T32643] Reported by Kernel Concurrency Sanitizer on: [ 2191.668745][T32643] CPU: 1 PID: 32643 Comm: syz-executor.0 Not tainted 5.14.0-rc4-syzkaller #0 [ 2191.677495][T32643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2191.687537][T32643] ================================================================== [ 2191.726618][T32644] loop4: detected capacity change from 0 to 16383 [ 2191.741929][T32644] EXT4-fs (loop4): bad geometry: block count 328192 exceeds size of device (8191 blocks) 03:51:57 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:57 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:57 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2191.870419][T32644] loop4: detected capacity change from 0 to 16383 [ 2191.890859][T32644] EXT4-fs (loop4): bad geometry: block count 328192 exceeds size of device (8191 blocks) 03:51:57 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:57 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:57 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:57 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:57 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002060019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:57 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:57 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:57 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(0x0, &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:57 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2192.122369][T32716] loop4: detected capacity change from 0 to 16383 03:51:58 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2192.199569][T32716] EXT4-fs (loop4): bad geometry: block count 393728 exceeds size of device (8191 blocks) 03:51:58 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:58 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:58 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:58 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:58 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2192.361514][T32763] loop4: detected capacity change from 0 to 16383 03:51:58 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2192.413595][T32763] EXT4-fs (loop4): bad geometry: block count 393728 exceeds size of device (8191 blocks) 03:51:58 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002070019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:58 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:58 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:58 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:58 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:58 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2192.582800][ T350] loop4: detected capacity change from 0 to 16383 03:51:58 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:58 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2192.677815][ T350] EXT4-fs (loop4): bad geometry: block count 459264 exceeds size of device (8191 blocks) 03:51:58 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:58 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:58 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:58 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2192.828412][ T397] loop4: detected capacity change from 0 to 16383 [ 2192.887148][ T397] EXT4-fs (loop4): bad geometry: block count 459264 exceeds size of device (8191 blocks) 03:51:58 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002080019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:58 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:58 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:58 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:58 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:58 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:58 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:58 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:59 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2193.133152][ T452] loop4: detected capacity change from 0 to 16383 03:51:59 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:59 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2193.187464][ T452] EXT4-fs (loop4): bad geometry: block count 524800 exceeds size of device (8191 blocks) 03:51:59 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2193.417960][ T497] loop4: detected capacity change from 0 to 16383 [ 2193.486930][ T497] EXT4-fs (loop4): bad geometry: block count 524800 exceeds size of device (8191 blocks) 03:51:59 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002090019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:59 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:59 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:59 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:59 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:59 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:59 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:59 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:59 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:59 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:59 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:59 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2193.805418][ T561] loop4: detected capacity change from 0 to 16383 [ 2193.844347][ T561] EXT4-fs (loop4): bad geometry: block count 590336 exceeds size of device (8191 blocks) [ 2193.962880][ T598] loop4: detected capacity change from 0 to 16383 [ 2193.975605][ T598] EXT4-fs (loop4): bad geometry: block count 590336 exceeds size of device (8191 blocks) 03:51:59 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000020a0019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:51:59 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:59 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) 03:51:59 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:51:59 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:51:59 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:51:59 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) [ 2194.056097][ T619] loop4: detected capacity change from 0 to 16383 [ 2194.084916][ T619] EXT4-fs (loop4): bad geometry: block count 655872 exceeds size of device (8191 blocks) 03:52:00 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:52:00 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:52:00 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) 03:52:00 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2194.199717][ T653] loop4: detected capacity change from 0 to 16383 03:52:00 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2194.261365][ T653] EXT4-fs (loop4): bad geometry: block count 655872 exceeds size of device (8191 blocks) 03:52:00 executing program 4: mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000020b0019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0xffffffffffffffff}], 0x0, &(0x7f0000013b00)) 03:52:00 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:52:00 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:52:00 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) 03:52:00 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, 0x0, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:52:00 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, 0x0, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") 03:52:00 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), 0x0) socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:52:00 executing program 3: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(0x0, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r1) 03:52:00 executing program 5: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) [ 2194.468197][ T729] loop4: detected capacity change from 0 to 16383 [ 2194.512042][ T729] EXT4-fs (loop4): bad geometry: block count 721408 exceeds size of device (8191 blocks) [ 2194.526592][ T740] ================================================================== [ 2194.534682][ T740] BUG: KCSAN: data-race in compact_zone / compact_zone [ 2194.541531][ T740] [ 2194.543846][ T740] write to 0xffff88823fffad90 of 8 bytes by task 739 on cpu 0: [ 2194.551380][ T740] compact_zone+0x1446/0x1ce0 [ 2194.556055][ T740] try_to_compact_pages+0x317/0x840 [ 2194.561245][ T740] __alloc_pages_direct_compact+0x61/0x330 [ 2194.567043][ T740] __alloc_pages_slowpath+0x5d4/0xb90 [ 2194.572490][ T740] __alloc_pages+0x25b/0x320 [ 2194.577078][ T740] alloc_pages+0x2e8/0x340 [ 2194.581483][ T740] __get_free_pages+0x8/0x30 [ 2194.586063][ T740] io_uring_create+0x904/0x1940 [ 2194.590937][ T740] __x64_sys_io_uring_setup+0xe1/0x120 [ 2194.596406][ T740] do_syscall_64+0x3d/0x90 [ 2194.600910][ T740] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2194.606800][ T740] [ 2194.609112][ T740] read to 0xffff88823fffad90 of 8 bytes by task 740 on cpu 1: [ 2194.616552][ T740] compact_zone+0x16f1/0x1ce0 [ 2194.621228][ T740] try_to_compact_pages+0x317/0x840 [ 2194.626422][ T740] __alloc_pages_direct_compact+0x61/0x330 [ 2194.632235][ T740] __alloc_pages_slowpath+0x29a/0xb90 [ 2194.637595][ T740] __alloc_pages+0x25b/0x320 [ 2194.642176][ T740] alloc_pages+0x2e8/0x340 [ 2194.646589][ T740] __get_free_pages+0x8/0x30 [ 2194.651186][ T740] io_uring_create+0x904/0x1940 [ 2194.656037][ T740] __x64_sys_io_uring_setup+0xe1/0x120 [ 2194.661489][ T740] do_syscall_64+0x3d/0x90 [ 2194.665895][ T740] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2194.671781][ T740] [ 2194.674088][ T740] value changed: 0x0000000000143200 -> 0x0000000000148000 [ 2194.681180][ T740] [ 2194.683519][ T740] Reported by Kernel Concurrency Sanitizer on: [ 2194.689650][ T740] CPU: 1 PID: 740 Comm: syz-executor.3 Not tainted 5.14.0-rc4-syzkaller #0 [ 2194.698229][ T740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:52:00 executing program 0: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) 03:52:00 executing program 2: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, 0x0, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="8983295b501f0a1745e02f66f2de94d33071b378db7b5ca3621bae70814074f56da218d76faa82518f5e35bfd73757459f82f49be8794f4799e343a2079820764c4703a31190133596da8c225d5459b7c68f4f641648071a191a6d5e46c72df06322e4715bfa5525c357e9aaca22dbdb1b64930d39043dc100") [ 2194.708270][ T740] ================================================================== 03:52:00 executing program 1: io_uring_setup(0x45db, &(0x7f0000000400)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x38d, @time={0x0, 0x9}, 0x0, {0xfd}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES16, @ANYBLOB="00072bbd7000ffdbdf250b0000000c00990006000000410000000c006e800400020004000200ee83d1d9d6608ad5ccd3cb310f3655c8e4b3c99cf08f26cb04cc34720700000000000000818d8d0f0d301576e44988180682f4b529499127ffd5892da348b5caf44be5db0e36afa4f76e43d20d94f2354e354bfa67033c61fd150514834ffd23192e01d624f5cb9f66db20e1194f33d5"], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0), 0xc, 0x0}, 0x8000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVid:De', 0x0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xffffffffffffffff) clone(0x80800600, 0x0, &(0x7f0000000300), &(0x7f0000000340), 0x0) socket$nl_route(0x10, 0x3, 0x0) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000480)='*$@/*%\x00', r2) socket(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 2194.887129][ T774] loop4: detected capacity change from 0 to 16383 [ 2194.904917][ T774] EXT4-fs (loop4): bad geometry: block count 721408 exceeds size of device (8191 blocks)