0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:46:59 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:46:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETIPTR(r4, 0x800c5011, &(0x7f0000000140)) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_RUN(r5, 0xae80, 0x0) 17:46:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = syz_init_net_socket$ax25(0x3, 0x3, 0x6) shutdown(r6, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="5800000024000705000000000000000000000008", @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100736662"], 0x58}}, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup3(r7, r8, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000002c0)={'veth0_to_team\x00', {0x2, 0x4e20, @multicast1}}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_SELECTION(r9, 0xc040563e, &(0x7f00000000c0)={0x1, 0x0, 0x100, 0x1, {0x9, 0xff, 0x8, 0x5}}) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB='<\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r5, @ANYBLOB="000000000000000000003d7f60000a00010062610b24ba34ccce68456c7302630000000c000200080001000077fa82f4"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001800000127bd7000000000001c141000ff002300000000161400120027009ba551e070728ade6a6e62676b84"], 0x30}}, 0x0) 17:46:59 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:46:59 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x14) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x8200) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r5, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000000, 0x8000000, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x8200}]) [ 342.864428] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 17:46:59 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 342.963124] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 343.000830] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 343.075869] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 17:46:59 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:46:59 executing program 5: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000140)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x3}, {&(0x7f0000000640)="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", 0x309, 0x34f9}, {&(0x7f0000000240)="7141901c1b74fc1bc07ea72bc3b27badde7c0200000046cc88e6f9cd996e9200e00f05eeff010000287c2367364d190b222bddbe83986ba21d4c0e0178658bea91cc819a4fee890d1bcab851a84caa132ac55d09f8ca4868bd094fa134212913da8694dc37e42f368d2258", 0x6b, 0xfffffffffffffff9}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) pivot_root(0x0, &(0x7f0000000200)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000440)='./file0/file0\x00', &(0x7f00000003c0)) setuid(0x0) syz_mount_image$nfs4(&(0x7f0000000340)='nfs4\x00', &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000600)='#.cpuset]-wlan1proc+keyring\x00') r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x480801, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000001c0)=0x81) sendfile(r0, r0, &(0x7f0000000480), 0xa198) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000500)={0x9f0000, 0x483ce00e, 0x1, r1, 0x0, &(0x7f00000004c0)={0x990a7e, 0x78bd79b, [], @p_u16=&(0x7f0000000000)=0x1}}) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f0000000540)) [ 343.122596] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 343.157702] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 17:46:59 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(0x0, 0x0, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r3, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(r3, &(0x7f0000ffc000/0x1000)=nil, 0x0) shmctl$SHM_INFO(r3, 0xe, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x66}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r4, &(0x7f0000001180), &(0x7f0000000400)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) [ 343.205450] audit: type=1800 audit(1589132819.569:62): pid=14323 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=15929 res=0 [ 343.237767] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 17:46:59 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:46:59 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c00050000008e777ffb1ceca93e138b7d0cdf2ecf0e72d05b2b9f6e591cd3a8a192a29dfc62b7e861a39665a9c4888dcdb08469f1d4fb80722c40685c2532ab8c2fdd904debee60ca19786e66985dcc16ba6aec031fd9a6a533615f03bf6c6cbbcacb28640ee1b3ac2b805d5b8c", @ANYRES16=r3, @ANYRESHEX], 0x38}, 0x1, 0x0, 0x0, 0x20044001}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=@newtfilter={0xf5, 0x2c, 0x10, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 17:46:59 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000080)={r6, 0x1}) write$P9_RLOPEN(r5, &(0x7f0000000140)={0x18, 0xd, 0x1, {{0x28, 0x0, 0x4}, 0x2}}, 0x18) ioctl$DRM_IOCTL_NEW_CTX(r5, 0x40086425, &(0x7f0000000100)={r6, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000000)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x5c}], [], 0x2f}) 17:46:59 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 343.508710] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 17:46:59 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270d", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:00 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000000)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x5c}], [], 0x2f}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x28, &(0x7f0000000100)}, 0x10) 17:47:00 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270d", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 343.687803] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 17:47:00 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270d", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0xd000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000380)="ba4200b80900efd2840e0065660f75010f01ca66b8000000000f23c80f21f86635000080000f23f80f38031dbaf80c66b884cab48566efbafc0c66ed3e91b88d008ed866b9800000c00f326635010000000f30", 0x53}], 0x1, 0x10, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x0, @local, 0xc0000}}, 0x291, 0x1, 0x209, 0x200, 0x100}, &(0x7f00000002c0)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000300)={r7, 0x17d9}, 0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 343.849907] overlayfs: upperdir is in-use by another mount, mount with '-o index=off' to override exclusive upperdir protection. 17:47:00 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 343.935984] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 17:47:00 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:00 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(0x0, 0x0, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r3, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(r3, &(0x7f0000ffc000/0x1000)=nil, 0x0) shmctl$SHM_INFO(r3, 0xe, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x66}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r4, &(0x7f0000001180), &(0x7f0000000400)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 17:47:00 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r4, r5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000800)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@private0}}, &(0x7f0000000900)=0xe8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000940)={0x3, @default, r6}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:00 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000fed000/0x13000)=nil, 0x1000}) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000500)={r5, 0x63c, "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"}, &(0x7f00000001c0)=0x644) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000003c0)={0x9, 0x0, 0x3, 0x0, r5}, 0x10) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x4}, 0x8) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='%', 0x1a000, 0x0, 0x0, 0x0) 17:47:00 executing program 1: socket(0x10, 0x803, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r0, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r1}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r1}, 0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f0000000080), &(0x7f0000000180)=0x4) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x10) getsockname$packet(r5, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=@newlink={0x50, 0x10, 0x705, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565, 0x13dd}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x50}, 0x1, 0x0, 0x0, 0x5}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x10) getsockname$packet(r8, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="5000000010bd70000000000100000000", @ANYRES32=0x0, @ANYBLOB="65350600dd1300001c0012800c0001006d6163766c616e000c00028008000100080000000a000500040000000000000008000a00", @ANYRES32=r9, @ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x5}, 0x0) 17:47:00 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(0x0, 0x0, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r3, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(r3, &(0x7f0000ffc000/0x1000)=nil, 0x0) shmctl$SHM_INFO(r3, 0xe, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x66}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r4, &(0x7f0000001180), &(0x7f0000000400)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) [ 344.547566] device gretap0 entered promiscuous mode 17:47:00 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 344.579940] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48400 sclass=netlink_route_socket pid=14417 comm=syz-executor.1 [ 344.604847] device macvlan2 entered promiscuous mode 17:47:01 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:01 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 344.756645] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48400 sclass=netlink_route_socket pid=14417 comm=syz-executor.1 [ 344.774512] device macvlan2 entered promiscuous mode 17:47:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x81104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000d80)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], &(0x7f00000001c0)=0x644) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000140)={0x9, 0x1, 0x5, 0x2, r6}, &(0x7f0000000180)=0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:01 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:01 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:01 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:01 executing program 1: write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x4) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="f8eb472d000000000000000000004000000000"], 0x18}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0x8f) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000480)={{0xa, 0x0, 0x8001, @mcast2}, {0xa, 0x0, 0x2, @local, 0x1}, 0x0, [0xfe3, 0x3fff, 0x0, 0x4, 0x2, 0x0, 0x0, 0xfffffffd]}, 0x5c) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x3fffffffffffffc, 0x100000001, 0x0, 0xfffffffffffffffc], 0x2000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x4e24, @remote}, 0x10) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 17:47:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r4, r5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000800)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@private0}}, &(0x7f0000000900)=0xe8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000940)={0x3, @default, r6}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r4, r5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000800)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@private0}}, &(0x7f0000000900)=0xe8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000940)={0x3, @default, r6}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:01 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:01 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1881d975c84dfa206c3494ae1a51475c0000000000000000000000000000007301430000000000950000006880b23c51932e00e35c4f692d9ccea83806b8"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x20000000}, 0x10}, 0x78) 17:47:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000300)={[], 0x3, 0x948, 0x1, 0xfff, 0x10000000}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socket(0x0, 0x800000003, 0x0) r0 = socket(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x6, 0x2100c0) socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x2c000004) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000001c0)={0x0, 0x0, 0xf40}, 0x8) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d003f00efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) socket(0x0, 0x80000, 0x20) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 17:47:01 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:01 executing program 2: getsockopt(0xffffffffffffffff, 0x0, 0xcb, &(0x7f00000012c0)=""/197, 0x0) socket(0x100000000011, 0x0, 0x0) geteuid() pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$netlink(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose='loose'}, {@dfltgid={'dfltgid'}}]}}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001bc0)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="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", 0xfe0}], 0x1, 0x0, 0x0, 0x10}, {0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)="c35edabe64d3e5715fc3fbe5a549ea2d5805670d6025c4af6cc8ac648362522b5ab36061862e", 0x26}], 0x1, 0x0, 0x0, 0x40008}, {&(0x7f0000001600)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001680)="76f0eb8ba89e82ec72eeb275e327cdd7b38a8ae6eb5a1f8b4580afab14b01554a61b132381775421d1", 0x29}, {&(0x7f00000016c0)}, {&(0x7f00000017c0)="c4fe9f834f655af8dfe5898f29f701d2ef0310dc2389800adc25bd1cb2dbb0afd2be016a290f028149403d29f80989148c16b4d9da31469936cbcff444f15de7f52a887b47bce14640e3fecbf51f3be9cfda384add44d84f0ddf8d79facd4674f08614b075fc44ea0fd361c895ab57be8dca3c36b9c0e6ac63890fef0b77e806fa61284244d8fe5ff48166e7cd9658476801026f581902a04b7d2056cd2ed2d76244", 0xa2}, {&(0x7f0000001880)}, {&(0x7f0000001980)="365eb6389e10c66bacb717d0e5d2ea869d8d22f6c2ff0bbef495420f6a33bedf1f185a011edcb5d471b771e3c54b4a464215cfc2f58184f027dabb9b10079112415e36d22719ba93633369e9eb568c5d6bca7c9f60c7b0be2b668446af8c2dcd2f846742d8b927e0c7ad8e7c48032b11", 0x70}], 0x5, &(0x7f0000001b80)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28, 0x4c000}], 0x3, 0x4004090) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x600) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x2000}}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 17:47:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x189100) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80050d, 0x84002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) sendto$inet(r0, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socket(0x0, 0x800000003, 0x0) r1 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=ANY=[@ANYRESOCT, @ANYBLOB="0f000300004c4f00e0ff"], 0x2c}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x2c000004) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000001c0)={0x0, 0x0, 0xf40}, 0x8) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d003f00efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) r2 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYRES16=r2, @ANYBLOB], 0x5c}}, 0x0) socket(0x0, 0x80000, 0x20) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 17:47:02 executing program 4: ftruncate(0xffffffffffffffff, 0x208200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000000}, 0x48}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x1e, &(0x7f0000000000)=0xffffffff, &(0x7f0000000040)=0x1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) ptrace$getregset(0x4204, r0, 0x1, &(0x7f0000000140)={&(0x7f00000000c0)=""/77, 0x4d}) 17:47:02 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:02 executing program 2: getsockopt(0xffffffffffffffff, 0x0, 0xcb, &(0x7f00000012c0)=""/197, 0x0) socket(0x100000000011, 0x0, 0x0) geteuid() pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$netlink(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose='loose'}, {@dfltgid={'dfltgid'}}]}}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001bc0)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="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", 0xfe0}], 0x1, 0x0, 0x0, 0x10}, {0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)="c35edabe64d3e5715fc3fbe5a549ea2d5805670d6025c4af6cc8ac648362522b5ab36061862e", 0x26}], 0x1, 0x0, 0x0, 0x40008}, {&(0x7f0000001600)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001680)="76f0eb8ba89e82ec72eeb275e327cdd7b38a8ae6eb5a1f8b4580afab14b01554a61b132381775421d1", 0x29}, {&(0x7f00000016c0)}, {&(0x7f00000017c0)="c4fe9f834f655af8dfe5898f29f701d2ef0310dc2389800adc25bd1cb2dbb0afd2be016a290f028149403d29f80989148c16b4d9da31469936cbcff444f15de7f52a887b47bce14640e3fecbf51f3be9cfda384add44d84f0ddf8d79facd4674f08614b075fc44ea0fd361c895ab57be8dca3c36b9c0e6ac63890fef0b77e806fa61284244d8fe5ff48166e7cd9658476801026f581902a04b7d2056cd2ed2d76244", 0xa2}, {&(0x7f0000001880)}, {&(0x7f0000001980)="365eb6389e10c66bacb717d0e5d2ea869d8d22f6c2ff0bbef495420f6a33bedf1f185a011edcb5d471b771e3c54b4a464215cfc2f58184f027dabb9b10079112415e36d22719ba93633369e9eb568c5d6bca7c9f60c7b0be2b668446af8c2dcd2f846742d8b927e0c7ad8e7c48032b11", 0x70}], 0x5, &(0x7f0000001b80)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28, 0x4c000}], 0x3, 0x4004090) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x600) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x2000}}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 17:47:02 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket(0x400000000010, 0x2, 0x0) recvmsg(r0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/157, 0x31}, 0x0) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f00000000c0)=0x8005d, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) 17:47:02 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:02 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:02 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:02 executing program 2: getsockopt(0xffffffffffffffff, 0x0, 0xcb, &(0x7f00000012c0)=""/197, 0x0) socket(0x100000000011, 0x0, 0x0) geteuid() pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$netlink(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose='loose'}, {@dfltgid={'dfltgid'}}]}}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001bc0)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="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", 0xfe0}], 0x1, 0x0, 0x0, 0x10}, {0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)="c35edabe64d3e5715fc3fbe5a549ea2d5805670d6025c4af6cc8ac648362522b5ab36061862e", 0x26}], 0x1, 0x0, 0x0, 0x40008}, {&(0x7f0000001600)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001680)="76f0eb8ba89e82ec72eeb275e327cdd7b38a8ae6eb5a1f8b4580afab14b01554a61b132381775421d1", 0x29}, {&(0x7f00000016c0)}, {&(0x7f00000017c0)="c4fe9f834f655af8dfe5898f29f701d2ef0310dc2389800adc25bd1cb2dbb0afd2be016a290f028149403d29f80989148c16b4d9da31469936cbcff444f15de7f52a887b47bce14640e3fecbf51f3be9cfda384add44d84f0ddf8d79facd4674f08614b075fc44ea0fd361c895ab57be8dca3c36b9c0e6ac63890fef0b77e806fa61284244d8fe5ff48166e7cd9658476801026f581902a04b7d2056cd2ed2d76244", 0xa2}, {&(0x7f0000001880)}, {&(0x7f0000001980)="365eb6389e10c66bacb717d0e5d2ea869d8d22f6c2ff0bbef495420f6a33bedf1f185a011edcb5d471b771e3c54b4a464215cfc2f58184f027dabb9b10079112415e36d22719ba93633369e9eb568c5d6bca7c9f60c7b0be2b668446af8c2dcd2f846742d8b927e0c7ad8e7c48032b11", 0x70}], 0x5, &(0x7f0000001b80)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28, 0x4c000}], 0x3, 0x4004090) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x600) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x2000}}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 17:47:02 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) poll(&(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {0xffffffffffffffff, 0x9485}], 0x7, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="70000000010801"], 0x70}}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)='/dev/snd/seq\x00', 0xffffffffffffffff}, 0x30) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 17:47:02 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000500)={r6, 0x63c, "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"}, &(0x7f00000001c0)=0x644) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000140)={r6, 0x9, 0x1, 0x101, 0xac1b, 0x10001}, &(0x7f0000000180)=0x14) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 17:47:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x189100) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:03 executing program 4: ftruncate(0xffffffffffffffff, 0x208200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000000}, 0x48}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x1e, &(0x7f0000000000)=0xffffffff, &(0x7f0000000040)=0x1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) ptrace$getregset(0x4204, r0, 0x1, &(0x7f0000000140)={&(0x7f00000000c0)=""/77, 0x4d}) 17:47:03 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:03 executing program 1: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) bind$l2tp6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000000c0)=0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f0000000640)=ANY=[@ANYBLOB="300100000a0201082cbd7000fddbdf250300000608005700", @ANYRES32=r3, @ANYBLOB="08002e00640101010c0004000104000000000000000141800c00030001000000000000000c003300030000000000000408000a00", @ANYRES32=r1, @ANYBLOB="bd031996cfee168dadad13c8bbe408e9b8a789cdb85a217cd6bcab9cb62b8525ce2a6b57bb8a1d1be8a8f7fa4daaac7504ff441f59e8015280ec5d02c1380a94fcf73a5a472644b2b8a9b3e8a1a09f8d4a972a70616a92929396e9ba3900db27df9e9816303063a165c5f52b06287e9646119bf08e4f3e6780fb383f7ee527b94d08b9577946c13343bf288be9f8ae9d2dd6851c19e727bd1561562cc9e86c9a62413d63afea946699eb43942f6ca8f6675d47076c0f8f6c747ec1e20c2248eb9c4f7728d7d619cf5651471daa4e76266b88b55708003d0000000000"], 0x130}, 0x1, 0x0, 0x0, 0x8000}, 0x44) r4 = socket$netlink(0x10, 0x3, 0x0) close(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuacct.usage_all\x00', 0x0, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200)='NLBL_MGMT\x00') socket$inet_sctp(0x2, 0x5, 0x84) ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x31) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000100)) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x7400, &(0x7f0000000400)={&(0x7f0000000140)=ANY=[@ANYBLOB="68000000100005070000f9bbc7e4b627ef40354a", @ANYRES32=0x0, @ANYBLOB="251002fffff000103400120009000100766c616e000000002400020006000100040000000c00020000000000000800000c000200090000000a0000000a0005000f0000000000000008000a0059bc40db1e5c170aadf2955f8b445fdac67ff0050ef40ad47eb6df9eaa79c68876c931179fa69f42fe5a81585ffc8ad42f615d27c53e33bddd047549f4bfe78e38e98a2d990000000000001c9fe00d49f6d0d6b0fe1da8a0f82c6abf266404f6b8e71b88b6d2ae918cff5a92a40ddf7b2474ba51375a9a90d303ac1c01a9139f1258fe32db4027f027fd995a2dbb4e996aedffb3b1847f0b406a1fae482510a1a9062f30b3c767024e4f62ac0281a0eb76aa6f3333a9a4a19c99ee1415ebd1682f1faf3cfe6fce36a9e2b467324b17b4919bede0ce4e3a8f42c6add2e2f9087041f0cc1c59faf2a9f6663a27153d64326dc5cefb6c087858cb7a1ac79f2baa3e3ee41872c2b406c7703ff7848a17bafdf280b4083c24e8e413cbb312567980e25e1fdf84b5a08033c6829556b205f6bbacec81ccd8e06e7991a5ed0b50d39857c6aaf24bad51017a6c64dcb988192a34dc5b0b8b8e3d3445535085c8d273d088a298a4fe840ee8af4a47070d4f63a3c560143f8e359de5db9c004241373ae5dfd3d7c89e9391bb4c734a0dcb639544b6d2dcbb48d3012ab65bc171f3bc60965fee6ad4a0c4f95a35bd230a", @ANYRES32=0x0, @ANYBLOB="b1095fdfe8d99b634415afcd2d83413c5068820300baca9e5914fbbc591310a608c14c8df202ec012aae962f6bd0a3da8fd0c1b03ae88a37621399519fed2e4341c89947509d2e959e4c865f5d96fc9c433a3320dd08d1524c0e4ab489efa5f7572479fe854a5b7393216b60"], 0x68}}, 0x0) 17:47:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x1) r2 = socket(0x0, 0x0, 0xff) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) dup(r2) 17:47:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x189100) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:03 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:03 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SUBDIVIDE(r5, 0xc0045009, &(0x7f0000000140)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r5, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x34, 0x2, 0x8, 0x301, 0x0, 0x0, {0x0, 0x0, 0x2}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6005}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x22eb}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 17:47:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000500)={r6, 0x63c, "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"}, &(0x7f00000001c0)=0x644) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000140)={r6, 0x9, 0x1, 0x101, 0xac1b, 0x10001}, &(0x7f0000000180)=0x14) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 17:47:04 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:04 executing program 5: ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0xfffffffffffffffc}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) getpid() recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x400000000000101, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xb}, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x5e}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_bp={&(0x7f00000001c0), 0x2}, 0x8000000200036050, 0x800007b, 0x0, 0x0, 0x4, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x2) clock_getres(0x2, &(0x7f0000000180)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/nf_conntrack_expect\x00') 17:47:04 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x6) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0100000000000000240012000c000100627269646765000e140002000800070000000000080027"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c0000001000390400"/20, @ANYRES32=r3, @ANYBLOB="00000000000000001c0012800b000100627269646765e5ff0b000280060027000000000050edf2d79079501415f24fda3ff45c4440455ff4099aef88986fb318d298d42db271ece5f37bf44963b952a3e4af2900d2b7b68249c8"], 0x3c}}, 0x0) 17:47:04 executing program 1: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) bind$l2tp6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000000c0)=0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f0000000640)=ANY=[@ANYBLOB="300100000a0201082cbd7000fddbdf250300000608005700", @ANYRES32=r3, @ANYBLOB="08002e00640101010c0004000104000000000000000141800c00030001000000000000000c003300030000000000000408000a00", @ANYRES32=r1, @ANYBLOB="bd031996cfee168dadad13c8bbe408e9b8a789cdb85a217cd6bcab9cb62b8525ce2a6b57bb8a1d1be8a8f7fa4daaac7504ff441f59e8015280ec5d02c1380a94fcf73a5a472644b2b8a9b3e8a1a09f8d4a972a70616a92929396e9ba3900db27df9e9816303063a165c5f52b06287e9646119bf08e4f3e6780fb383f7ee527b94d08b9577946c13343bf288be9f8ae9d2dd6851c19e727bd1561562cc9e86c9a62413d63afea946699eb43942f6ca8f6675d47076c0f8f6c747ec1e20c2248eb9c4f7728d7d619cf5651471daa4e76266b88b55708003d0000000000"], 0x130}, 0x1, 0x0, 0x0, 0x8000}, 0x44) r4 = socket$netlink(0x10, 0x3, 0x0) close(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuacct.usage_all\x00', 0x0, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200)='NLBL_MGMT\x00') socket$inet_sctp(0x2, 0x5, 0x84) ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x31) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000100)) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x7400, &(0x7f0000000400)={&(0x7f0000000140)=ANY=[@ANYBLOB="68000000100005070000f9bbc7e4b627ef40354a", @ANYRES32=0x0, @ANYBLOB="251002fffff000103400120009000100766c616e000000002400020006000100040000000c00020000000000000800000c000200090000000a0000000a0005000f0000000000000008000a0059bc40db1e5c170aadf2955f8b445fdac67ff0050ef40ad47eb6df9eaa79c68876c931179fa69f42fe5a81585ffc8ad42f615d27c53e33bddd047549f4bfe78e38e98a2d990000000000001c9fe00d49f6d0d6b0fe1da8a0f82c6abf266404f6b8e71b88b6d2ae918cff5a92a40ddf7b2474ba51375a9a90d303ac1c01a9139f1258fe32db4027f027fd995a2dbb4e996aedffb3b1847f0b406a1fae482510a1a9062f30b3c767024e4f62ac0281a0eb76aa6f3333a9a4a19c99ee1415ebd1682f1faf3cfe6fce36a9e2b467324b17b4919bede0ce4e3a8f42c6add2e2f9087041f0cc1c59faf2a9f6663a27153d64326dc5cefb6c087858cb7a1ac79f2baa3e3ee41872c2b406c7703ff7848a17bafdf280b4083c24e8e413cbb312567980e25e1fdf84b5a08033c6829556b205f6bbacec81ccd8e06e7991a5ed0b50d39857c6aaf24bad51017a6c64dcb988192a34dc5b0b8b8e3d3445535085c8d273d088a298a4fe840ee8af4a47070d4f63a3c560143f8e359de5db9c004241373ae5dfd3d7c89e9391bb4c734a0dcb639544b6d2dcbb48d3012ab65bc171f3bc60965fee6ad4a0c4f95a35bd230a", @ANYRES32=0x0, @ANYBLOB="b1095fdfe8d99b634415afcd2d83413c5068820300baca9e5914fbbc591310a608c14c8df202ec012aae962f6bd0a3da8fd0c1b03ae88a37621399519fed2e4341c89947509d2e959e4c865f5d96fc9c433a3320dd08d1524c0e4ab489efa5f7572479fe854a5b7393216b60"], 0x68}}, 0x0) 17:47:04 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:04 executing program 5: ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0xfffffffffffffffc}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) getpid() recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x400000000000101, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xb}, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x5e}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_bp={&(0x7f00000001c0), 0x2}, 0x8000000200036050, 0x800007b, 0x0, 0x0, 0x4, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x2) clock_getres(0x2, &(0x7f0000000180)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/nf_conntrack_expect\x00') 17:47:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x10000, 0x2, 0x0, 0x2000, &(0x7f0000004000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:04 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:04 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000200)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./bus\x00', 0x8) getdents(r0, &(0x7f0000001440)=""/177, 0xb1) 17:47:04 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000000)={0x4, 0x0, [{0x8, 0x0, 0x4}, {0x4, 0x0, 0x4000}, {0x80000001, 0x0, 0x8}, {0x4, 0x0, 0x1}]}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1019c2, 0x0) r3 = open$dir(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="bb8f9f640903127a53527c6fbfe65d43b0e0586f2d40c7e7df58cac83420e83662d6e39bb6d5430622431454eedeeaee423d8f210bc3525fa7927c18d5fbc91ab13c2041136047d8da9375934d00f325499bfe7712208d387d41c31821c2a22d", 0x60) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0xf77) fallocate(r4, 0x0, 0x5e00, 0x2cbd) sendfile(r2, r3, 0x0, 0x13000) 17:47:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x104, r4, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xed}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xefa7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffff9b35}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xc7c}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4d28}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x200}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfe000000}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x1}, 0x4000001) userfaultfd(0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) [ 348.493770] overlayfs: filesystem on './file0' not supported as upperdir 17:47:04 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000200)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./bus\x00', 0x8) getdents(r0, &(0x7f0000001440)=""/177, 0xb1) 17:47:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x4) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50d, 0x82c10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x2, 0x0) ioctl$TCSETX(r6, 0x5433, &(0x7f00000002c0)={0xfe3a, 0xfde, [0xffff, 0x8f, 0x5, 0x2, 0x4], 0x7cd}) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000300)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_RUN(r5, 0xae80, 0x0) 17:47:04 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 348.669703] audit: type=1804 audit(1589132825.029:63): pid=14711 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir140548525/syzkaller.4rY5yV/151/file0" dev="sda1" ino=16006 res=1 [ 348.774192] audit: type=1804 audit(1589132825.029:64): pid=14711 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir140548525/syzkaller.4rY5yV/151/file0" dev="sda1" ino=16006 res=1 17:47:05 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x1, &(0x7f0000000200)=[{0x20, 0x0, 0x20, 0x100}]}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507800000f70000000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="440000001000810500000000000000000000000d", @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r6], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) 17:47:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x6624, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = open(0x0, 0x0, 0x0) renameat(r0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f000000f000/0x4000)=nil, 0x4000}, 0x1}) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000001100)={0x9, {{0x2, 0x4e22, @remote}}}, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r2) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/4096) setsockopt$inet6_int(r1, 0x29, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r1, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2, 0x3}, 0x1c) r5 = accept4(r1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r5, 0x8983, &(0x7f00000000c0)={0x0, 'vxcan1\x00', {}, 0x3}) sendmmsg(r5, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) 17:47:05 executing program 0: r0 = add_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000002c0)={r0, 0x15, 0xcb}, &(0x7f0000000300)={'enc=', 'oaep', ' hash=', {'digest_null\x00'}}, &(0x7f0000000380)="06ecb3e83f7a5d507a62fa3abc61efe69fe26c3ca3", &(0x7f0000000440)=""/203) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(r5, 0x80084121, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r5, 0xb704, &(0x7f00000001c0)) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 349.051685] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 17:47:05 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f0000000000), 0x4) clone(0x802102901ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x2, 0x3, 0x298, 0xc8, 0xc8, 0x0, 0xc8, 0x0, 0x200, 0x200, 0x200, 0x200, 0x200, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ip={@loopback, @rand_addr, 0x0, 0x0, 'veth0_to_batadv\x00', 'caif0\x00'}, 0x0, 0xd8, 0x138, 0x0, {}, [@common=@unspec=@physdev={{0x68, 'physdev\x00'}, {'ip6_vti0\x00', {}, 'bridge_slave_0\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) [ 349.171395] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 17:47:05 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400), 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 349.391991] audit: type=1804 audit(1589132825.759:65): pid=14704 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir140548525/syzkaller.4rY5yV/151/file0" dev="sda1" ino=16006 res=1 17:47:05 executing program 5: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x37cb1133) socket$inet(0x2, 0x3, 0x33) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000040)=""/152) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000002c0), 0x1}, 0x0, 0x0, 0x0, 0x8, 0x1, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="e8fbffff13b3c916ad33f843d034a5351dae9509c06058313ccf8fdbfd26cf4bdaa46979b0a76ae97832e87e048dc108f2908b2dbd0e7574b9ddbf00"/71, @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f0000000500)={r7, 0x63c, "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"}, &(0x7f00000001c0)=0x644) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r7, 0xa75, 0x10001}, &(0x7f0000000140)=0xc) 17:47:05 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 349.464063] audit: type=1804 audit(1589132825.779:66): pid=14704 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir140548525/syzkaller.4rY5yV/151/file0" dev="sda1" ino=16006 res=1 17:47:05 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400), 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:06 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) syz_mount_image$xfs(0x0, &(0x7f0000000100)='./bus\x00', 0x8000, 0x4, &(0x7f0000000680)=[{&(0x7f0000000580)="0090b84280f1dbded5138e80170f6baf2f010029f4e51cc4fee7289e0e031be72a99dee297912109b2c031f90553c75b04bd2671065837335dccde41c09c594acc1d128463c8bf138b7a19182dd61f07c5c69335066a06766d7e8fd7015ff5b6cd687f3abb271d5dcc5283c9154c29a8a90643d490230c0b3c13d7a2d43aba10796d346646b813249699d1", 0x8b, 0x5}, {&(0x7f00000003c0)="29aabbc68e8f24df84417c28a4b6cb9c183bc143b48900d85d2ad22dd63e0475a67d3aabb38ad6b44ac1b5bd594110ff703fa9433d3beab20e593064b76798b38d5d37853f8c11", 0x47, 0xa64}, {&(0x7f0000000440)="000045e55680d243083b1dd1844437cf4a005b051e6bb5961591c470208d2d9ac45a50271586b0424e10d0213ed4ae3e634578b8ac1af4cdf48a9c", 0x3b, 0x3ff}, {&(0x7f0000000700)="07605596eb32e24c3d23643a09ce4ae0f537d6cd1de70dda056ce228bb11c9a5a2ba9400ca6382aa9aec480088dca30b9b702efd9872654ef4725c385a", 0x3d, 0x6d}], 0x22080, &(0x7f0000000240)=ANY=[]) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14, 0x69, 0x0, {0x0, 0x0, 0x1000000}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f00000002c0)={0x0, @pix={0x0, 0x2, 0x38414762, 0x8, 0x3, 0xed1f, 0x3, 0x2, 0x1, 0x3, 0x3, 0x4}}) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x20302, 0x0) fdatasync(r4) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x100000, r4, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$perf(&(0x7f00002ba000/0x4000)=nil, 0x4000, 0x0, 0x810, 0xffffffffffffffff, 0x7ff) [ 349.618446] xt_TCPMSS: Only works on TCP SYN packets 17:47:06 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400), 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000c80)={0x1, 0x70, 0x5, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x8, 0x2b67, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fdatasync(0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) r2 = socket(0x15, 0x1, 0x1000) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) accept$phonet_pipe(r2, 0x0, &(0x7f0000000000)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x0) [ 349.699888] audit: type=1804 audit(1589132826.059:67): pid=14784 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir140548525/syzkaller.4rY5yV/152/bus" dev="sda1" ino=15807 res=1 17:47:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{&(0x7f0000000440)=@xdp, 0x80, &(0x7f0000000bc0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x3) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000000c0)={0x0, 0x11}, &(0x7f00000003c0)=ANY=[@ANYBLOB="656ea43d6f6165702053617368452e786861737836342d67656e65736963000000000000400000000000000000ef00000000020000000000000000000000000000000000000000000000000000b9b27f437c40650431fa079d4fd8fbbb5f0b8cec0f9317281148fe25bdafeb816b92d21fce544e"], &(0x7f00000001c0)="aa91750dacde1105a6e7422f675f3a4fc0", 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b17d9aeb42d3575fa1be4e0415cb5cf3a639cab5a10cdef67c07515cb7e7ce834b00"/75, 0x4b) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) sendfile(r5, r5, &(0x7f0000000200), 0xff8) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x5, 0x800, 0x0, 0x800000000, 0x200000}, r0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000180)='Z\x00') 17:47:06 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90", 0x3f) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 349.861489] audit: type=1804 audit(1589132826.159:68): pid=14784 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir140548525/syzkaller.4rY5yV/152/bus" dev="sda1" ino=15807 res=1 [ 349.866318] rdma_op ffff88809ee99198 conn xmit_rdma (null) 17:47:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000c80)={0x1, 0x70, 0x5, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x8, 0x2b67, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fdatasync(0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) r2 = socket(0x15, 0x1, 0x1000) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) accept$phonet_pipe(r2, 0x0, &(0x7f0000000000)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x0) 17:47:06 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90", 0x3f) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:06 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90", 0x3f) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 350.167916] audit: type=1804 audit(1589132826.309:69): pid=14798 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir140548525/syzkaller.4rY5yV/152/bus" dev="sda1" ino=15807 res=1 [ 350.237244] rdma_op ffff8880a89cc418 conn xmit_rdma (null) 17:47:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000c80)={0x1, 0x70, 0x5, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x8, 0x2b67, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fdatasync(0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) r2 = socket(0x15, 0x1, 0x1000) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) accept$phonet_pipe(r2, 0x0, &(0x7f0000000000)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x0) [ 350.312440] audit: type=1804 audit(1589132826.319:70): pid=14784 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir140548525/syzkaller.4rY5yV/152/bus" dev="sda1" ino=15807 res=1 17:47:06 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400), 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:06 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90", 0x3f) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 350.377043] rdma_op ffff8880a8655b18 conn xmit_rdma (null) 17:47:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000c80)={0x1, 0x70, 0x5, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x8, 0x2b67, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fdatasync(0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) r2 = socket(0x15, 0x1, 0x1000) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) accept$phonet_pipe(r2, 0x0, &(0x7f0000000000)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x0) 17:47:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000c80)={0x1, 0x70, 0x5, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x8, 0x2b67, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fdatasync(0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x60}}], 0x48}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000030, 0x0) r2 = socket(0x15, 0x1, 0x1000) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) accept$phonet_pipe(r2, 0x0, &(0x7f0000000000)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x0) [ 350.437904] audit: type=1804 audit(1589132826.379:71): pid=14784 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir140548525/syzkaller.4rY5yV/152/bus" dev="sda1" ino=15807 res=1 17:47:06 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000500)=ANY=[@ANYRES32=r4, @ANYBLOB="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"], &(0x7f00000001c0)=0x644) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000)={r4, 0x7fffffff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000100)=r5, 0x4) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6000, 0x1) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(r6, 0x125d, &(0x7f0000000040)) [ 350.508808] rdma_op ffff88808c83ca98 conn xmit_rdma (null) [ 350.523827] rdma_op ffff888053d65d98 conn xmit_rdma (null) 17:47:06 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f00000001c0)={'L+'}, 0x16, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = dup2(r1, r0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1e, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r4, 0x4010ae74, &(0x7f0000000040)={0x5, 0x4, 0x9}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:47:06 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf2", 0x5e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 350.583869] audit: type=1804 audit(1589132826.569:72): pid=14800 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir140548525/syzkaller.4rY5yV/152/bus" dev="sda1" ino=15807 res=1 17:47:07 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf2", 0x5e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:07 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) write$binfmt_misc(r8, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0xd5) 17:47:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000080), 0x0, r2) keyctl$revoke(0x3, r2) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) add_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000)={0x2, 0x400, 0x6, 0x74, 0x7}, 0x14) [ 350.783868] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 350.805539] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:47:07 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf2", 0x5e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 350.867740] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 350.932229] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 350.969893] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:47:07 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf2", 0x5e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 350.984123] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 17:47:07 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a7", 0x6e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 351.067827] F2FS-fs (loop1): Fix alignment : done, start(5120) end(13312) block(7168) 17:47:07 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf2", 0x5e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 351.116090] attempt to access beyond end of device [ 351.165996] loop1: rw=12288, want=8200, limit=20 [ 351.188350] F2FS-fs (loop1): invalid crc value 17:47:07 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a7", 0x6e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:07 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000040)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 351.229095] attempt to access beyond end of device [ 351.278379] loop1: rw=12288, want=12296, limit=20 [ 351.303490] F2FS-fs (loop1): invalid crc value [ 351.327446] F2FS-fs (loop1): Failed to get valid F2FS checkpoint [ 351.385600] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 351.405775] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 351.416199] attempt to access beyond end of device [ 351.422651] loop1: rw=12288, want=8200, limit=20 [ 351.428100] F2FS-fs (loop1): invalid crc value [ 351.434483] attempt to access beyond end of device [ 351.440980] loop1: rw=12288, want=12296, limit=20 [ 351.445971] F2FS-fs (loop1): invalid crc value 17:47:07 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a7", 0x6e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:07 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000040)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:07 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) userfaultfd(0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200200, 0x0) recvfrom$phonet(r1, &(0x7f0000000100)=""/85, 0x55, 0x2, &(0x7f0000000080)={0x23, 0x1, 0x5, 0x4}, 0x10) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x600000)=nil, 0x602000, 0x9) dup2(0xffffffffffffffff, r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$EVIOCGID(r3, 0x80084502, &(0x7f0000000000)=""/44) 17:47:07 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a7", 0x6e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 351.538103] attempt to access beyond end of device [ 351.565539] loop1: rw=12288, want=8200, limit=20 [ 351.623142] attempt to access beyond end of device [ 351.672814] loop1: rw=12288, want=12296, limit=20 [ 351.702394] attempt to access beyond end of device [ 351.713248] loop1: rw=12288, want=8200, limit=20 [ 351.733632] attempt to access beyond end of device [ 351.753117] loop1: rw=12288, want=12296, limit=20 17:47:08 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) write$binfmt_misc(r8, &(0x7f0000000740)=ANY=[@ANYBLOB="73797a314c4dde4a50a3fe2459dbaf18286dde9baa2447aa0449cd5d1bbbb5c66b3f73d712459582eb85672f4d1463a3272ac391e070f91f1a9aa222c3c2bd55ed86c6f700c924196cb78f4b06521775d70779007428d4a354c29097f5cc2812e20f641bcddcfb31fbf2f8ae045e57d18510a2c514f658df0059748353e96b4c56a89c6d5e3a2feea31a20a1dd9e8ecafd3495e07fb58019d7f57bf4a749b0b438f70912ff24b677535018ecf711fb33d9332ca5ffa0dcf86f8bb20bcfeea82047ec32d99cb9823317094c5f597050e3bb65f601e6992b6b0d1a9b52d2ebd1f826a21a80e79dfed00fa419fd2c59cc7effad8d237a998113f5c4da613b7f31c10499530442e5b884bf4faaa35449ee285534d5c925e1f9a499f44b0b75223b2f0bdeb6c284ff6e80c1045ff33b9fd23afb18fdf7adf7a99d79f0f7a90720bc90cbc37699a51a02550845035227602fe0739b8c39ff73bd3798aa759ff8f362d97903a5ba924c4da16c4aacc80e1371b7fc01332e7e0d4abdad1ad2dd3a66c2c856a26fdf19b5c3887023585c9c41c90b865f01294192e326953b06a0cf80ee6c8bfded9f2206cbea696a64cdb3c15ebed24743d6279b86621bc7d308619cb336001baef49548111e7ad2a55a223a2399026cf63c793dab499de60bf39f8718ec0c7683c20dceb1931e6e4c809df6df84cd6f4db851278163d0687ac1189b0336ee10abfc0c4f7a228992bdbdfe799c912537faed8e854facb0e270d3628f1e848ebb2e179d218807f81f30"], 0xd5) 17:47:08 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000040)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:08 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2", 0x76) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:08 executing program 5: socket$bt_rfcomm(0x1f, 0x1, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xe}, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000001280)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f00000000c0)) close(r0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000180)='./bus\x00', 0x16000, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./bus\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_inet6_tcp_SIOCATMARK(r6, 0x8905, &(0x7f0000000000)) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 17:47:08 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000040)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:08 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2", 0x76) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 352.011670] attempt to access beyond end of device [ 352.045664] loop1: rw=12288, want=8200, limit=20 17:47:08 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2", 0x76) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:08 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000040)) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 352.086558] attempt to access beyond end of device [ 352.116892] loop1: rw=12288, want=12296, limit=20 17:47:08 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2", 0x76) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 352.186373] attempt to access beyond end of device [ 352.226278] loop1: rw=12288, want=8200, limit=20 [ 352.251322] attempt to access beyond end of device 17:47:08 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000040)) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 352.275461] loop1: rw=12288, want=12296, limit=20 17:47:08 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) write$binfmt_misc(r8, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0xd5) 17:47:08 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000340)=""/29) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x6000, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000500)={r3, 0x63c, "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"}, &(0x7f00000001c0)=0x644) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={r3, 0xe6}, 0x8) ioctl$VT_GETMODE(r0, 0x5601, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) 17:47:08 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c03166", 0x7a) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:08 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000040)) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:09 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 352.715720] attempt to access beyond end of device [ 352.755304] loop1: rw=12288, want=8200, limit=20 17:47:09 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c03166", 0x7a) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 352.802095] attempt to access beyond end of device [ 352.807442] loop1: rw=12288, want=12296, limit=20 [ 352.857699] attempt to access beyond end of device 17:47:09 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:09 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c03166", 0x7a) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 352.939333] loop1: rw=12288, want=8200, limit=20 [ 352.973459] attempt to access beyond end of device [ 352.989230] loop1: rw=12288, want=12296, limit=20 17:47:09 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090", 0x7c) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:09 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:09 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) write$binfmt_misc(r8, &(0x7f0000000740)=ANY=[@ANYBLOB="73797a314c4dde4a50a3fe2459dbaf18286dde9baa2447aa0449cd5d1bbbb5c66b3f73d712459582eb85672f4d1463a3272ac391e070f91f1a9aa222c3c2bd55ed86c6f700c924196cb78f4b06521775d70779007428d4a354c29097f5cc2812e20f641bcddcfb31fbf2f8ae045e57d18510a2c514f658df0059748353e96b4c56a89c6d5e3a2feea31a20a1dd9e8ecafd3495e07fb58019d7f57bf4a749b0b438f70912ff24b677535018ecf711fb33d9332ca5ffa0dcf86f8bb20bcfeea82047ec32d99cb9823317094c5f597050e3bb65f601e6992b6b0d1a9b52d2ebd1f826a21a80e79dfed00fa419fd2c59cc7effad8d237a998113f5c4da613b7f31c10499530442e5b884bf4faaa35449ee285534d5c925e1f9a499f44b0b75223b2f0bdeb6c284ff6e80c1045ff33b9fd23afb18fdf7adf7a99d79f0f7a90720bc90cbc37699a51a02550845035227602fe0739b8c39ff73bd3798aa759ff8f362d97903a5ba924c4da16c4aacc80e1371b7fc01332e7e0d4abdad1ad2dd3a66c2c856a26fdf19b5c3887023585c9c41c90b865f01294192e326953b06a0cf80ee6c8bfded9f2206cbea696a64cdb3c15ebed24743d6279b86621bc7d308619cb336001baef49548111e7ad2a55a223a2399026cf63c793dab499de60bf39f8718ec0c7683c20dceb1931e6e4c809df6df84cd6f4db851278163d0687ac1189b0336ee10abfc0c4f7a228992bdbdfe799c912537faed8e854facb0e270d3628f1e848ebb2e179d218807f81f30"], 0xd5) 17:47:09 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090", 0x7c) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:09 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 353.259557] attempt to access beyond end of device [ 353.278929] loop1: rw=12288, want=8200, limit=20 [ 353.305936] attempt to access beyond end of device [ 353.349311] loop1: rw=12288, want=12296, limit=20 [ 353.390293] attempt to access beyond end of device [ 353.423557] loop1: rw=12288, want=8200, limit=20 17:47:09 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000340)=""/29) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x6000, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000500)={r3, 0x63c, "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"}, &(0x7f00000001c0)=0x644) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={r3, 0xe6}, 0x8) ioctl$VT_GETMODE(r0, 0x5601, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) 17:47:09 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090", 0x7c) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:09 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:09 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000300)={0x2c, r4, 0x703, 0x0, 0x0, {0x4}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="240086ed7b0367640db76b3b02ce6d2b2e91d94b62bdd8551570c01887bd2ac2743220380cdba102cd05493f8243375fc2b3ffaaa6bf6f", @ANYRES16=r4, @ANYBLOB="000228bd7000fbdbdf250300000005000300080000000500020020000000"], 0x24}, 0x1, 0x0, 0x0, 0x8004}, 0x40000) r5 = dup(r0) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev={0xfe, 0x80, [0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x20c200a2, r6}) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1c8) r10 = dup3(r8, r9, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$CAN_RAW_FD_FRAMES(r10, 0x65, 0x5, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) [ 353.472042] attempt to access beyond end of device [ 353.525802] loop1: rw=12288, want=12296, limit=20 17:47:09 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:10 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:10 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) 17:47:10 executing program 2: socket$bt_rfcomm(0x1f, 0x1, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000001280)={[0x0, 0x0, 0x40000007]}) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./bus\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x242000, 0x0) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f00000000c0)='syz1\x00') ftruncate(r2, 0x200004) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000000), 0x4) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 17:47:10 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:10 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 353.797958] attempt to access beyond end of device [ 353.816884] loop1: rw=12288, want=8200, limit=20 [ 353.835328] attempt to access beyond end of device 17:47:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x1, 0x0, 0x7, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}, 0x918, 0x0, 0xffff7fff, 0x0, 0x0, 0x80000001, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$cgroup_ro(r6, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r7, 0xc008ae67, &(0x7f0000000180)={0x45, 0xffffff00}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 353.859724] loop1: rw=12288, want=12296, limit=20 [ 353.885757] attempt to access beyond end of device [ 353.909348] loop1: rw=12288, want=8200, limit=20 17:47:10 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 353.921231] audit: type=1804 audit(1589132830.279:73): pid=15064 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir140548525/syzkaller.4rY5yV/158/bus" dev="sda1" ino=16494 res=1 [ 353.966598] attempt to access beyond end of device [ 353.991474] loop1: rw=12288, want=12296, limit=20 17:47:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20001, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x2000, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x14, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0xc4b090c445606a8a) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:10 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:10 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) 17:47:10 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:10 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) 17:47:10 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f0000000200)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup3(0xffffffffffffffff, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x6d, &(0x7f0000000500)={r8, 0x63c, "6f931d8881df086d8cbb25585d041f396a3df12105a60181f100cd946f04befd42d1fd8331bf8ac0cc7e1d2d9819082c22651a81290b7e179eb6f2cc0f23796d62cb953b8e1ff22e0f954c90b28d8cc987e47b6b3cc170200c296fbe955112ef8d064bfbbd03e84d9d1cabcbbd1add1a7ebfd3a6a6a0e5ff84e8c72734647a5b213198e910ce12312bbfaeededd6116111c7b693bb198e4770fcce5d384c385c93335dc09e6eab7d1f2054e509e0e6d8a2599759c33ae15edc55278e50dfda641cbc1834e23f69d807a3af611bcd7b31c37a0da53c1680451f91e5b5156f83d705d0721d5e746ecbc536f08850ae28bcd96a38e06cb22d3198d6d8982474d1887cb48974536266cd175a97e6010331d3a8c5f0941058a1ff5b5b810cf9b52664895ccc5918abdd528e15a3fc88c5f5065e685b6997affb394ab6238cf0d3a4f4892bcd0c2f891493f1f9565db5c630ee25d88be47c5e3d120886b9c96a246761b15b730fdb4667e8a6cb6346790002eb71262b886d2f444deefbb51ed8525a24ad382381acb339d4b695f87a20e1d872618713344eb39443ab6650edad81ae3932a0671e9b4a224ebe26e0781d59dd48b88daa34264327b56b20dabd0fe526a798224ef58a1e24ccfacb299e9c0722046d05e291ebb968f964ef01a2c53b9f755f85522b9fa8b40f62a58e83105d00aac8e1b39d5bc594a2d748bdd6c051e1490653d3948ae0ddb440a2094ca3db47fd790472a8cbde2d4575afea5d2747a871cf84ba1ea4c44c5bcdbd1f474bec6c86babcff030027a0ff2666844857d11deceb04997cfa6b012bf89dc92816c23579f6f08296fc17c6d0467517e7bedb2e9f8242610dc384cccacd2ede17ce895dd19fa37c78b6ddc859e97460d24b38fd45bc6ea95d47f8f010cc0b284e37e17e7d8ac8ba4d8c2bcad88aa962079d9a4e3a3ef6c2a15441e2a4d8f8f7037b3a4a351dad0ba4df0c6a2e782de475c92f486b4f038967380e90c4d217ec97d8ec00a4666bc9f4956f1ea9b5c2f25e021662433605eef360fdea93b913ddef78d69cb03d16180e442eef250c3002c6d048ba93de26a2510c0743b3c32c2ec7b7a62a83a29dac97cf6c3eba0a6830592b7d3f63b9923955e834b735e92510052ba3786cecdc29f635240a6cecb37235b7cec371562dda5e786ff3653516eed5f77f8ef75724e4062e289c9a02d036ee9de74ab22d7f64d6f963e4dd2add5b18ebf0aed76472d67165648427264f3ad7cdf4eee72e6cfd9524932f576f8d71e898403e5bad17d8410d42313bc7ef981821dcd607a857d5ead6a1bfbbd1e10618cecd887313cada3e009253eb2a92c26227e39bfc9091bde7eb47f511fadb735e75cc1bb9917b8bf7977c5b7fc08835c5ea3211aedd8aed76a7cf43d43ead3c123fda89c3ca493a3da6f54196fa0a008a71260fcf50a534b458667dae4beca9201fae917321895ac89433bdafd49de93dacdd4dc2a6f19237b5f33838853306cd614d82ad699c23240e502e1b24ebc8d540ca19d8f13f08c99fe9346c117a378393b7798b5309cb36230d12caaef2edaf27d8c8944a2bb86ee60bdcdc3c0c1cd9cae4e5c4b6a02730b426a95a8d153b836093617d5b1f917a36b2c051e4469786c3397ba9a42e6ffebdc49256bdf4d5c8bab52d295f4794d2ac0e6e29d89118afdb5755ccf82aedd1019d710630e8c8c5f3fd6d0ab674d79ec3cd5c211a09aa90eb85b53ba00d0973c4b4a1de855aaebf967311d7283bd8d3ef888c278ae8d66da669af9c7698d779a172a7cd7ea0b5daad8d14c8ba8deb8f7f89991a8ef10d7cc5bb5c2c7d5c4a13c1c395f5db306172506819e176aaf193d725f88fc6c035c12aad82b42d6fe528a6d39cedfb779108e4c491b8b3588f8421f9e3e82e01db40abdd7a56ee0a4d4cf88f0e409d144108cc4d4b58b2f55bd73d67c0d5f6ddbaa555515c6b31f7c287db24c5e6446d6647570a489f56eff50f656b5b927f9d1a6626d8ff4d5a8516c69f401eac05577b4e5587abd1d67e8ce86db02ac76cacc9cc4848ad844d444dc3fa48a971f90f7fb5962509834c5d00e735e57b9ce48c01b3b6a1d4d17d8ce63d0247f4837155e17885da6ce3a79da32e06f40b116cf74346ffd5cebfef007ce51520c354172301f8497d7157f44b82ae1a612e78af85b983a73501279294ccec21d275c4ad5153345f61b7edbe3a43365bb7d48fd14e8ed63f6b22ab5c02a1891033a4b817fc851f"}, &(0x7f00000001c0)=0x644) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000300)={r8, @in6={{0xa, 0x4e20, 0x5, @remote, 0x1}}, 0x10000, 0x7, 0x1f, 0x3, 0x2e, 0x8001}, 0x9c) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000007c0)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r9}]]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x48}}, 0x0) [ 354.447688] attempt to access beyond end of device 17:47:10 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 354.483043] attempt to access beyond end of device [ 354.488288] loop1: rw=12288, want=8200, limit=20 17:47:10 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 354.540639] loop2: rw=12288, want=8200, limit=20 [ 354.567822] attempt to access beyond end of device [ 354.577063] attempt to access beyond end of device [ 354.592593] loop2: rw=12288, want=12296, limit=20 [ 354.602799] loop1: rw=12288, want=12296, limit=20 [ 354.603047] device vti0 entered promiscuous mode [ 354.609174] attempt to access beyond end of device [ 354.619411] attempt to access beyond end of device [ 354.625150] loop2: rw=12288, want=8200, limit=20 [ 354.630690] loop1: rw=12288, want=8200, limit=20 [ 354.641495] attempt to access beyond end of device [ 354.657332] attempt to access beyond end of device 17:47:11 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 354.673779] loop2: rw=12288, want=12296, limit=20 [ 354.683908] loop1: rw=12288, want=12296, limit=20 17:47:11 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYRESOCT], 0x34}, 0x1, 0x0, 0x0, 0x40000084}, 0x4000001) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r3, 0x500, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x5}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4008000}, 0x44000) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(r6, 0xc058560f, &(0x7f0000000180)={0xffff, 0xa, 0x4, 0x10000, 0x8, {0x77359400}, {0x4, 0x8, 0x8, 0x20, 0x7f, 0xa5, "6add09e9"}, 0x7fff, 0x3, @planes=&(0x7f0000000140)={0xaa89, 0xffff665c, @userptr=0x1c0, 0x871}, 0x400, 0x0, r2}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff, 0x7}, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:11 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 354.751462] print_req_error: I/O error, dev loop1, sector 16 17:47:11 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) 17:47:11 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) 17:47:11 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:11 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 354.933556] attempt to access beyond end of device [ 354.985136] loop1: rw=12288, want=8200, limit=20 [ 354.998910] attempt to access beyond end of device [ 355.017744] loop2: rw=12288, want=8200, limit=20 [ 355.017849] attempt to access beyond end of device 17:47:11 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 355.043530] attempt to access beyond end of device [ 355.054860] loop1: rw=12288, want=12296, limit=20 [ 355.080427] attempt to access beyond end of device [ 355.095325] loop2: rw=12288, want=12296, limit=20 [ 355.118625] loop1: rw=12288, want=8200, limit=20 [ 355.142130] attempt to access beyond end of device [ 355.145320] attempt to access beyond end of device [ 355.160924] loop1: rw=12288, want=12296, limit=20 [ 355.176540] loop2: rw=12288, want=8200, limit=20 [ 355.204716] attempt to access beyond end of device [ 355.222079] loop2: rw=12288, want=12296, limit=20 17:47:11 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:11 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x7, 0x200000) sendmsg$AUDIT_DEL_RULE(r3, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)={0x430, 0x3f4, 0x4, 0x70bd25, 0x25dfdbfb, {0x10, 0x2, 0x18, [0x8000, 0x3, 0x6af8067a, 0xfffffffc, 0x9, 0x2, 0x5, 0x7, 0x5d7c668e, 0x9, 0xfffffffe, 0xfffffffc, 0x80, 0xfffffff8, 0xff, 0x0, 0x3f, 0x20a, 0x0, 0xdd, 0x8, 0x1, 0x0, 0x0, 0xd2, 0x37, 0x8, 0x4, 0xcf, 0x756, 0x8, 0xe7, 0x7, 0x6, 0x5, 0x4, 0x1ff, 0x290b, 0x101, 0x0, 0xff, 0x4, 0x2, 0x9, 0x3f, 0x9, 0x9, 0x80, 0x3, 0xda, 0x101, 0x0, 0x6, 0x1, 0x1, 0xfffc0000, 0x1cc7, 0x3ff, 0xfffffffe, 0x3, 0x9, 0x10001, 0x0, 0x4], [0x7f, 0x0, 0x7fff, 0x7, 0x9, 0x7, 0x9, 0x6, 0x80, 0xba82, 0x7fff, 0x20d, 0x7, 0x8, 0x100, 0x0, 0x2, 0x40, 0x200, 0x6, 0x0, 0x4, 0xe3, 0x3, 0x6, 0x8000, 0x0, 0x8789, 0x7ff, 0x63fd, 0xe8dc, 0x0, 0x46e, 0x80000001, 0x9, 0x5, 0xdd9, 0x0, 0x7, 0x80000000, 0x101, 0x2, 0x3, 0x6d, 0x9, 0x3ff, 0x7ff, 0x1000, 0xac2, 0x4, 0x7, 0x100, 0xdf8, 0xffffffff, 0x0, 0x7547c0e1, 0x400, 0xabc, 0xe0e, 0x200, 0x5, 0xf9, 0x2, 0x40], [0x0, 0x101, 0x5, 0x9, 0x2, 0x8001, 0x8001, 0x401, 0x80000001, 0x6, 0x8, 0xffff, 0x3f, 0x9, 0x7fff, 0x3ff, 0x7, 0x1, 0x7ff, 0x80000000, 0x3f, 0x380, 0x7, 0x9, 0x2, 0x4, 0xe, 0x1, 0x6, 0x6, 0xfffffffe, 0x0, 0x0, 0x8000, 0x1, 0x5eb, 0x8ae, 0x4, 0x7, 0x6, 0x2f6, 0x7fff, 0x6, 0x1, 0xffff, 0x7fff, 0x20000, 0x0, 0x5, 0x35, 0x9, 0x7ff, 0x2, 0x3, 0x4, 0x73, 0x5, 0x3, 0x7f, 0xfffff001, 0x0, 0x10000, 0x3, 0x7], [0xfffffffd, 0x2, 0x0, 0x16fc5e65, 0x2f3, 0x1ff, 0x7, 0x7, 0x300, 0xffffff01, 0x9, 0x8, 0x0, 0x10001, 0xfffffe00, 0x2, 0x2, 0x3f00, 0x2, 0x80, 0x200, 0x6, 0x1, 0xc5f2, 0x0, 0xffff17f4, 0x5, 0x40, 0x5, 0xffff, 0x81, 0x0, 0x1, 0x4, 0x0, 0x0, 0x4, 0x9, 0x0, 0x8001, 0x2d16, 0x78, 0x6, 0x0, 0x2, 0x7fffffff, 0x7, 0xfffffffd, 0x1, 0x18000, 0x1f, 0xca20, 0x5, 0x6, 0x7, 0xfff, 0x0, 0x6fe5, 0x1f, 0x2, 0x6, 0x8, 0x8000, 0x22b], 0xf, ['\x00', 'proceth1eth0-\x00']}, ["", "", "", "", "", "", "", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x10}, 0x40800) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ptrace$setregset(0x4205, r4, 0x3, &(0x7f0000000180)={&(0x7f0000000140)="734bbc60bc8aaad287cb", 0xa}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKPBSZGET(r5, 0x127b, &(0x7f0000000380)) 17:47:11 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:11 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) 17:47:11 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) [ 355.396740] attempt to access beyond end of device 17:47:11 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r2 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r1, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 355.443379] loop1: rw=12288, want=8200, limit=20 17:47:11 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:11 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0xf311, 0x22840) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, &(0x7f0000000040)=0xffffffffffffff3f) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000500)={r5, 0x63c, "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"}, &(0x7f00000001c0)=0x644) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000000)={r5, 0x1ff}, &(0x7f0000000080)=0x8) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000100)={0x0, 0x1, 0x2c, "f4e86070ca1ad76c1426dee980b86a0b7f4676ead48c4026e0cfadff05a2d2a20521ef25d830dc3a8b9c01d4"}, 0x34) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup3(r6, r7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_DRAIN(r8, 0x4144, 0x0) [ 355.468829] attempt to access beyond end of device [ 355.470982] attempt to access beyond end of device [ 355.502901] loop1: rw=12288, want=12296, limit=20 [ 355.528674] loop2: rw=12288, want=8200, limit=20 [ 355.532268] attempt to access beyond end of device [ 355.549867] attempt to access beyond end of device [ 355.553529] loop1: rw=12288, want=8200, limit=20 [ 355.567143] attempt to access beyond end of device 17:47:11 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r2 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r1, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 355.594560] loop2: rw=12288, want=12296, limit=20 [ 355.595271] loop1: rw=12288, want=12296, limit=20 17:47:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UFFDIO_ZEROPAGE(r5, 0xc020aa04, &(0x7f0000000140)={{&(0x7f0000001000/0x2000)=nil, 0x2000}}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:12 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 355.635178] attempt to access beyond end of device [ 355.669939] loop2: rw=12288, want=8200, limit=20 [ 355.682607] attempt to access beyond end of device 17:47:12 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) 17:47:12 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r2 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r1, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 355.714609] loop2: rw=12288, want=12296, limit=20 17:47:12 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:12 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, 0x0) 17:47:12 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) 17:47:12 executing program 4: creat(0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 355.854578] attempt to access beyond end of device 17:47:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x4, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) eventfd(0x97) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:12 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, 0x0) [ 355.886520] loop1: rw=12288, want=8200, limit=20 [ 355.906269] attempt to access beyond end of device [ 355.931510] loop1: rw=12288, want=12296, limit=20 [ 355.945141] f2fs_msg: 126 callbacks suppressed [ 355.945150] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 355.949156] F2FS-fs (loop1): invalid crc value [ 355.963726] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 355.991417] F2FS-fs (loop2): Fix alignment : done, start(5120) end(13312) block(7168) [ 356.003620] F2FS-fs (loop1): Failed to get valid F2FS checkpoint [ 356.026710] attempt to access beyond end of device [ 356.037857] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 356.044256] loop2: rw=12288, want=8200, limit=20 [ 356.058137] F2FS-fs (loop2): invalid crc value [ 356.067098] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 356.088464] attempt to access beyond end of device [ 356.096271] attempt to access beyond end of device [ 356.109652] loop1: rw=12288, want=8200, limit=20 [ 356.109845] loop2: rw=12288, want=12296, limit=20 [ 356.125137] F2FS-fs (loop1): invalid crc value [ 356.133104] F2FS-fs (loop2): invalid crc value [ 356.138931] attempt to access beyond end of device [ 356.152842] attempt to access beyond end of device [ 356.164307] loop1: rw=12288, want=12296, limit=20 [ 356.172883] loop2: rw=12288, want=8200, limit=20 [ 356.190942] attempt to access beyond end of device [ 356.203267] loop2: rw=12288, want=12296, limit=20 17:47:12 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r2 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r1, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:12 executing program 4: creat(0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:12 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, 0x0) 17:47:12 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x40002, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000340)={0x1, 'team_slave_0\x00', 0x2}, 0x18) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000380)={'batadv0\x00'}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_ATOMIC(r6, 0xc03864bc, &(0x7f0000000300)={0x100, 0x0, &(0x7f0000000140), &(0x7f0000000180)=[0x26, 0x7, 0xbf, 0x7], &(0x7f00000001c0)=[0x3f, 0x81, 0x9, 0x5, 0xff, 0x7ff, 0x9], &(0x7f00000002c0)=[0x2, 0x6], 0x0, 0x9}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:47:12 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) 17:47:12 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) 17:47:12 executing program 4: creat(0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 356.497524] attempt to access beyond end of device [ 356.509209] loop2: rw=12288, want=8200, limit=20 [ 356.516175] attempt to access beyond end of device [ 356.536881] attempt to access beyond end of device 17:47:12 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x0, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:12 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ax25_int(r2, 0x101, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000000c0)=r5) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000040)={'lo\x00', 0x400}) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="2000000011000de600"/20, @ANYRES32=r10, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) [ 356.550232] loop1: rw=12288, want=8200, limit=20 17:47:12 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 356.574783] loop2: rw=12288, want=12296, limit=20 [ 356.596141] attempt to access beyond end of device [ 356.614646] attempt to access beyond end of device [ 356.621979] loop1: rw=12288, want=12296, limit=20 17:47:13 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x0, 0x400, 0x1ff, 0x40000, 0x7}) [ 356.650132] loop2: rw=12288, want=8200, limit=20 [ 356.656596] attempt to access beyond end of device [ 356.674061] attempt to access beyond end of device 17:47:13 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 356.712395] loop2: rw=12288, want=12296, limit=20 [ 356.716297] loop1: rw=12288, want=8200, limit=20 [ 356.746139] attempt to access beyond end of device [ 356.776601] loop1: rw=12288, want=12296, limit=20 17:47:13 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) 17:47:13 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 17:47:13 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x0, 0x400, 0x1ff, 0x40000, 0x7}) [ 356.833265] print_req_error: I/O error, dev loop1, sector 16 17:47:13 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x0, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:13 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x600201) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000140)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 356.996076] attempt to access beyond end of device [ 357.002879] attempt to access beyond end of device [ 357.013140] loop2: rw=12288, want=8200, limit=20 [ 357.035744] loop1: rw=12288, want=8200, limit=20 17:47:13 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x0, 0x1ff, 0x40000, 0x7}) [ 357.046089] attempt to access beyond end of device [ 357.062048] attempt to access beyond end of device [ 357.071323] loop2: rw=12288, want=12296, limit=20 [ 357.082919] loop1: rw=12288, want=12296, limit=20 17:47:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000), 0x1c) listen(0xffffffffffffffff, 0x400000001ffffffd) socket$inet6(0xa, 0x6, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000a80)=@filter={'filter\x00', 0xe, 0x4, 0x378, 0x0, 0x0, 0x1208, 0x108, 0x108, 0x12d8, 0x12d8, 0x12d8, 0x12d8, 0x12d8, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast1, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'rose0\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d8) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{0x0, 0x0, 0x0, 0x0, 0xf9}, {0x104000}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, {}, {}, {}, {}, 0xe0010022, 0x0, 0x0, 0x1a4, 0x0, 0x0, 0x0, [0x5a88]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 357.100464] attempt to access beyond end of device [ 357.108659] attempt to access beyond end of device [ 357.138239] loop2: rw=12288, want=8200, limit=20 17:47:13 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 357.153490] loop1: rw=12288, want=8200, limit=20 [ 357.170792] attempt to access beyond end of device [ 357.177892] attempt to access beyond end of device [ 357.188711] loop2: rw=12288, want=12296, limit=20 17:47:13 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x0, 0x1ff, 0x40000, 0x7}) [ 357.203903] loop1: rw=12288, want=12296, limit=20 17:47:13 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:13 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:13 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) 17:47:13 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x0, 0x1ff, 0x40000, 0x7}) 17:47:13 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x0, 0x1ff, 0x40000, 0x7}) 17:47:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1e, 0x0, 0x0, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1e, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:13 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 357.439465] attempt to access beyond end of device [ 357.457226] loop1: rw=12288, want=8200, limit=20 [ 357.463118] attempt to access beyond end of device [ 357.496129] attempt to access beyond end of device [ 357.510757] loop1: rw=12288, want=12296, limit=20 [ 357.531792] attempt to access beyond end of device [ 357.532856] loop2: rw=12288, want=8200, limit=20 17:47:13 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, &(0x7f0000000180)={0xe, 0x2}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x20800, 0x0) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r8, r9, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000240)="432202f20f5d34c465460fae18c74424008779397bc74424020000c0fec7442406000000000f01142466baa100b04beec442f993a4c86e705e05c7442400fd970000c74424027d010000c7442406000000000f011424b8010000000f01d90f01f8660f388272f5", 0x67}], 0x1, 0x2f, 0x0, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) fsync(r10) ioctl$KVM_RUN(r9, 0xae80, 0x0) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000000)={0x0, 0xa, 0x4, 0x2000, 0xffff, {0x0, 0xea60}, {0x1, 0x1, 0xeb, 0x35, 0x1f, 0x40, "8a4c0aeb"}, 0x2, 0x1, @userptr=0x9, 0xfffffbff, 0x0, r9}) [ 357.566865] loop1: rw=12288, want=8200, limit=20 17:47:14 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x0, 0x40000, 0x7}) 17:47:14 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 357.591491] attempt to access beyond end of device [ 357.607986] loop1: rw=12288, want=12296, limit=20 [ 357.609453] attempt to access beyond end of device [ 357.633853] loop2: rw=12288, want=12296, limit=20 17:47:14 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 357.653173] attempt to access beyond end of device [ 357.671738] loop2: rw=12288, want=8200, limit=20 [ 357.690571] attempt to access beyond end of device [ 357.724689] loop2: rw=12288, want=12296, limit=20 17:47:14 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x0, 0x40000, 0x7}) 17:47:14 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:14 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) [ 357.824544] attempt to access beyond end of device [ 357.867530] loop1: rw=12288, want=8200, limit=20 [ 357.890088] attempt to access beyond end of device [ 357.908676] loop1: rw=12288, want=12296, limit=20 17:47:14 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x0, 0x40000, 0x7}) [ 357.945078] attempt to access beyond end of device [ 357.952847] attempt to access beyond end of device [ 357.972907] loop1: rw=12288, want=8200, limit=20 [ 357.995555] loop2: rw=12288, want=8200, limit=20 [ 358.011742] attempt to access beyond end of device [ 358.034598] attempt to access beyond end of device [ 358.041004] loop1: rw=12288, want=12296, limit=20 17:47:14 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 358.058222] loop2: rw=12288, want=12296, limit=20 17:47:14 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x0, 0x40000, 0x7}) [ 358.083323] attempt to access beyond end of device 17:47:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x40001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10044}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000140)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 358.116719] loop2: rw=12288, want=8200, limit=20 17:47:14 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x80000) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:14 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x0, 0x7}) [ 358.144023] attempt to access beyond end of device 17:47:14 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 358.193243] loop2: rw=12288, want=12296, limit=20 17:47:14 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x0, 0x40000, 0x7}) 17:47:14 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) [ 358.286755] attempt to access beyond end of device 17:47:14 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x0, 0x7}) 17:47:14 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 358.316068] loop1: rw=12288, want=8200, limit=20 [ 358.354968] attempt to access beyond end of device [ 358.374508] loop1: rw=12288, want=12296, limit=20 17:47:14 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x0, 0x40000, 0x7}) 17:47:14 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x0, 0x7}) [ 358.408312] attempt to access beyond end of device [ 358.426456] attempt to access beyond end of device [ 358.440225] loop1: rw=12288, want=8200, limit=20 17:47:14 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 358.459751] attempt to access beyond end of device [ 358.476816] loop2: rw=12288, want=8200, limit=20 [ 358.482351] loop1: rw=12288, want=12296, limit=20 [ 358.504810] attempt to access beyond end of device [ 358.556118] loop2: rw=12288, want=12296, limit=20 17:47:14 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000}) 17:47:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x1, 0xf8, &(0x7f00000002c0)="baa5b8f979214b3e0774086cd053b49f2681990b2d19e22b88165c6e5c697e8be23a98d873a66fdd5b296418b49903944ae79416ae5659637dd26dc360dbb11b4d16210fe1a9c05f3d0f57b72ef4fe768ffa0175a41053d69bf5d68ed5e36c0fedfdd3c7750cbf06b01b445b0bf2b9ae663bf1034b8c2c6d54387455a0eaf268edf9d9ab90a155f1ab6ccea92fde0e474d2a1c72096545fe5bebe2562419ab38b83645554844d20f704a3225b40afa4df0fd1431acf6c58941f725e7e2ad32c1bd9efff191affd7f4b5f5273368a62a71e83375dc9d751af9b76452b84f6b29e1a020faf71ffc97b01d5f2d43ce06fef62586bc655af6a04"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:14 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x80000) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:14 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) sendmsg$IPSET_CMD_HEADER(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x6c, 0xc, 0x6, 0x801, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) accept(r1, 0x0, 0x0) [ 358.577754] attempt to access beyond end of device [ 358.587454] loop2: rw=12288, want=8200, limit=20 [ 358.600582] attempt to access beyond end of device [ 358.611664] loop2: rw=12288, want=12296, limit=20 17:47:15 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:15 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000}) 17:47:15 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) 17:47:15 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x80000) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 358.713578] attempt to access beyond end of device [ 358.732389] loop1: rw=12288, want=8200, limit=20 [ 358.745168] attempt to access beyond end of device [ 358.766290] loop1: rw=12288, want=12296, limit=20 17:47:15 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 358.791011] attempt to access beyond end of device 17:47:15 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000}) [ 358.815501] attempt to access beyond end of device [ 358.828415] loop1: rw=12288, want=8200, limit=20 [ 358.837146] loop2: rw=12288, want=8200, limit=20 [ 358.847365] attempt to access beyond end of device [ 358.855483] attempt to access beyond end of device [ 358.861626] loop1: rw=12288, want=12296, limit=20 [ 358.866816] loop2: rw=12288, want=12296, limit=20 [ 358.879011] attempt to access beyond end of device [ 358.879285] attempt to access beyond end of device [ 358.896776] loop2: rw=12288, want=8200, limit=20 [ 358.903168] loop5: rw=12288, want=8200, limit=20 17:47:15 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x80000) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:15 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 358.934857] attempt to access beyond end of device [ 358.941447] attempt to access beyond end of device [ 358.963029] loop5: rw=12288, want=12296, limit=20 [ 358.968382] attempt to access beyond end of device 17:47:15 executing program 3 (fault-call:19 fault-nth:0): r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 358.997582] loop2: rw=12288, want=12296, limit=20 [ 359.008983] loop5: rw=12288, want=8200, limit=20 [ 359.048709] attempt to access beyond end of device [ 359.080981] attempt to access beyond end of device [ 359.091546] print_req_error: I/O error, dev loop2, sector 16 [ 359.107203] FAULT_INJECTION: forcing a failure. [ 359.107203] name failslab, interval 1, probability 0, space 0, times 0 [ 359.120941] CPU: 0 PID: 15634 Comm: syz-executor.3 Not tainted 4.14.180-syzkaller #0 [ 359.123200] loop5: rw=12288, want=12296, limit=20 [ 359.128852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.128858] Call Trace: [ 359.128886] dump_stack+0x13e/0x194 [ 359.128906] should_fail.cold+0x10a/0x14b [ 359.128923] should_failslab+0xd6/0x130 [ 359.128946] kmem_cache_alloc_trace+0x2db/0x7b0 [ 359.128966] ? strncpy+0x35/0xc0 [ 359.147430] loop1: rw=12288, want=8200, limit=20 [ 359.149468] do_blk_trace_setup+0x11e/0xad0 [ 359.149490] blk_trace_setup+0xa3/0x120 [ 359.178773] ? do_blk_trace_setup+0xad0/0xad0 [ 359.183262] ? retint_kernel+0x2d/0x2d [ 359.187273] sg_ioctl+0x2f9/0x2620 [ 359.190816] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 359.195570] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 359.200140] ? retint_kernel+0x2d/0x2d [ 359.204037] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 359.208617] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 359.213212] do_vfs_ioctl+0x75a/0xfe0 [ 359.217032] ? selinux_file_mprotect+0x5c0/0x5c0 [ 359.221785] ? ioctl_preallocate+0x1a0/0x1a0 [ 359.226209] ? security_file_ioctl+0x76/0xb0 [ 359.230757] ? security_file_ioctl+0x83/0xb0 [ 359.235199] SyS_ioctl+0x7f/0xb0 [ 359.238582] ? do_vfs_ioctl+0xfe0/0xfe0 [ 359.242550] do_syscall_64+0x1d5/0x640 [ 359.246457] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.251770] RIP: 0033:0x45c829 [ 359.254962] RSP: 002b:00007fe8e77e5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 359.262671] RAX: ffffffffffffffda RBX: 00000000004e1660 RCX: 000000000045c829 [ 359.269943] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000005 [ 359.277325] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 359.284611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 359.291886] R13: 000000000000022a R14: 00000000004c4506 R15: 00007fe8e77e66d4 [ 359.312517] attempt to access beyond end of device [ 359.321208] loop1: rw=12288, want=12296, limit=20 [ 359.326835] attempt to access beyond end of device 17:47:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000140)={0x81, 0x401, 0x8, 0x4, 0xfffff173}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:15 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:15 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) sendto$packet(r5, &(0x7f0000000240)="70c860a324b9d203efb42f9791d9a189da124be51f5dac0fa36c891033651fa9047917cc92988c88c194173116b84a43e63a61c25c7ac1743d1db9a8b106b7651879fede4acd6b6e0120bd7520ee96858b03fc066ad0b07443d10bce9eb54dafd324d133b7e0206c51a1fda1b61919d7981889f2f5f19de2900d7e", 0x7b, 0x10, &(0x7f0000000180)={0x11, 0x7, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 17:47:15 executing program 3 (fault-call:19 fault-nth:1): r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 359.332811] loop1: rw=12288, want=8200, limit=20 [ 359.338255] attempt to access beyond end of device [ 359.344490] loop1: rw=12288, want=12296, limit=20 17:47:15 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:15 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x80000) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 359.471893] attempt to access beyond end of device 17:47:15 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 359.493266] loop2: rw=12288, want=8200, limit=20 [ 359.523008] attempt to access beyond end of device [ 359.541962] attempt to access beyond end of device [ 359.554867] loop2: rw=12288, want=12296, limit=20 [ 359.575985] attempt to access beyond end of device [ 359.583511] loop1: rw=12288, want=8200, limit=20 [ 359.589141] attempt to access beyond end of device [ 359.607700] attempt to access beyond end of device [ 359.609608] loop5: rw=12288, want=8200, limit=20 17:47:15 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0xffffffffffffff61, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x4000000000, 0xfffffffe, 0x0, 0x0, 0x6}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x200000000000000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa098dc2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53497f7e435085e2e20226cc06e2fb4ab556c872125db6d65ce04000000b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1ae79989add6bbd4b97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="08009cb3b51d89249a273cff07000001007063690011000200303030303a30303a31302e30000008000600707bf4ab00000000020030", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:16 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 359.624563] loop2: rw=12288, want=8200, limit=20 [ 359.635813] loop1: rw=12288, want=12296, limit=20 [ 359.635916] attempt to access beyond end of device [ 359.650123] attempt to access beyond end of device [ 359.675805] attempt to access beyond end of device [ 359.678879] loop1: rw=12288, want=8200, limit=20 [ 359.696930] attempt to access beyond end of device [ 359.705499] loop5: rw=12288, want=12296, limit=20 [ 359.720291] loop1: rw=12288, want=12296, limit=20 17:47:16 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x141100) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:16 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 359.732048] loop2: rw=12288, want=12296, limit=20 [ 359.744567] attempt to access beyond end of device [ 359.768877] loop5: rw=12288, want=8200, limit=20 [ 359.812785] attempt to access beyond end of device 17:47:16 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 359.834036] loop5: rw=12288, want=12296, limit=20 17:47:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:16 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:16 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 359.958271] attempt to access beyond end of device 17:47:16 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x80000) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:16 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="0800010070631a9146760200303030303a30303a31302e3000000008008b0000", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 359.986897] loop2: rw=12288, want=8200, limit=20 [ 359.998629] attempt to access beyond end of device 17:47:16 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 360.033992] attempt to access beyond end of device [ 360.043728] loop1: rw=12288, want=8200, limit=20 [ 360.055921] loop2: rw=12288, want=12296, limit=20 [ 360.065848] attempt to access beyond end of device [ 360.087170] loop1: rw=12288, want=12296, limit=20 [ 360.091664] attempt to access beyond end of device [ 360.112999] attempt to access beyond end of device 17:47:16 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 360.138652] loop1: rw=12288, want=8200, limit=20 [ 360.152420] loop2: rw=12288, want=8200, limit=20 [ 360.160391] attempt to access beyond end of device [ 360.161998] attempt to access beyond end of device [ 360.187625] loop1: rw=12288, want=12296, limit=20 [ 360.206759] attempt to access beyond end of device 17:47:16 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:16 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 360.246920] loop5: rw=12288, want=8200, limit=20 [ 360.260907] loop2: rw=12288, want=12296, limit=20 [ 360.306933] attempt to access beyond end of device [ 360.339400] loop5: rw=12288, want=12296, limit=20 [ 360.371196] attempt to access beyond end of device 17:47:16 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:16 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 360.394945] loop5: rw=12288, want=8200, limit=20 [ 360.444415] attempt to access beyond end of device [ 360.456308] attempt to access beyond end of device [ 360.481428] loop5: rw=12288, want=12296, limit=20 [ 360.481671] loop1: rw=12288, want=8200, limit=20 17:47:16 executing program 0: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000140)=0x3) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1e, 0x0, 0x0, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x100, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, &(0x7f0000000180)={0x0, 0x9d000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:16 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000840)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="a07120f405f9ed0ba89cc02b80a33b48e9ea47f208dca40719ba325c8992faaf49eb4d04f5b2705eb5f403b031ef057c401743915fbacc49f18601e4"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 360.511535] attempt to access beyond end of device [ 360.517829] attempt to access beyond end of device [ 360.531357] loop2: rw=12288, want=8200, limit=20 [ 360.538535] loop1: rw=12288, want=12296, limit=20 17:47:16 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, 0x0) [ 360.562988] attempt to access beyond end of device [ 360.575113] attempt to access beyond end of device [ 360.583497] loop2: rw=12288, want=12296, limit=20 [ 360.599723] loop1: rw=12288, want=8200, limit=20 [ 360.608566] attempt to access beyond end of device 17:47:17 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 360.627909] attempt to access beyond end of device [ 360.634722] loop2: rw=12288, want=8200, limit=20 [ 360.641202] loop1: rw=12288, want=12296, limit=20 [ 360.647273] attempt to access beyond end of device [ 360.654325] loop2: rw=12288, want=12296, limit=20 17:47:17 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, 0x0) 17:47:17 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup3(r3, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:17 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x80000) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 360.779596] attempt to access beyond end of device [ 360.803227] loop5: rw=12288, want=8200, limit=20 [ 360.835998] attempt to access beyond end of device 17:47:17 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, 0x0) [ 360.858168] loop5: rw=12288, want=12296, limit=20 17:47:17 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121, 0x0, 0xfffffffd, 0x9, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000a40)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d9318000800000003000000080001007063690011000200303130303a303000000000000000b30f2dbe623ca3b00abb8d66131fe6ed47048cba2b0e773c", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="ea3d809508b0f287ff34f1aae15637deee5c08a80886f200100000000000010000002fb4e901a739c610303ea7a516f1abd9269281c5efd9ed32df10949c0d19ab5d63be9b6a46922f3f1e3d885f4d11864e9d96152c7a45ce"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 360.884044] attempt to access beyond end of device [ 360.894633] attempt to access beyond end of device [ 360.906896] attempt to access beyond end of device [ 360.912851] loop2: rw=12288, want=8200, limit=20 [ 360.914560] loop5: rw=12288, want=8200, limit=20 [ 360.925803] loop1: rw=12288, want=8200, limit=20 [ 360.943759] attempt to access beyond end of device [ 360.954242] f2fs_msg: 265 callbacks suppressed [ 360.954251] F2FS-fs (loop5): invalid crc value [ 360.956908] F2FS-fs (loop2): invalid crc value [ 360.964548] loop1: rw=12288, want=12296, limit=20 [ 360.975056] attempt to access beyond end of device [ 360.981725] loop5: rw=12288, want=12296, limit=20 [ 360.986805] F2FS-fs (loop1): invalid crc value 17:47:17 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 361.008634] attempt to access beyond end of device [ 361.017418] F2FS-fs (loop5): invalid crc value [ 361.035062] F2FS-fs (loop1): Failed to get valid F2FS checkpoint [ 361.044950] loop2: rw=12288, want=12296, limit=20 [ 361.047550] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 361.064436] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 361.071946] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 361.081209] attempt to access beyond end of device [ 361.083301] F2FS-fs (loop2): invalid crc value [ 361.086308] loop1: rw=12288, want=8200, limit=20 [ 361.097425] F2FS-fs (loop1): invalid crc value 17:47:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f00000003c0)={0x980000, 0x1ff, 0x9, r5, 0x0, &(0x7f0000000380)={0x990a7e, 0x1, [], @string=&(0x7f0000000340)=0x8}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x4000, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000140)='gtp\x00') [ 361.125538] attempt to access beyond end of device 17:47:17 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:17 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 361.150813] attempt to access beyond end of device [ 361.153782] loop2: rw=12288, want=8200, limit=20 [ 361.171636] loop1: rw=12288, want=12296, limit=20 [ 361.200153] attempt to access beyond end of device 17:47:17 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup3(r3, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 361.225670] loop2: rw=12288, want=12296, limit=20 17:47:17 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES64, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c000300000008000100706369001100020030311c303a303000000000000000", @ANYRES32, @ANYRESOCT, @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 361.279845] attempt to access beyond end of device [ 361.284830] loop5: rw=12288, want=8200, limit=20 17:47:17 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) 17:47:17 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x80000) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 361.324905] attempt to access beyond end of device [ 361.353246] loop5: rw=12288, want=12296, limit=20 [ 361.366204] attempt to access beyond end of device [ 361.395070] attempt to access beyond end of device [ 361.409409] loop1: rw=12288, want=8200, limit=20 [ 361.427416] loop5: rw=12288, want=8200, limit=20 [ 361.445564] attempt to access beyond end of device [ 361.471722] attempt to access beyond end of device [ 361.482716] overlayfs: unrecognized mount option "app" or missing value [ 361.490545] attempt to access beyond end of device [ 361.492340] loop1: rw=12288, want=12296, limit=20 [ 361.513381] loop5: rw=12288, want=12296, limit=20 17:47:17 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 361.518505] loop2: rw=12288, want=8200, limit=20 [ 361.532723] attempt to access beyond end of device [ 361.553820] loop1: rw=12288, want=8200, limit=20 17:47:17 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r7, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x3a, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 361.570130] attempt to access beyond end of device [ 361.578370] attempt to access beyond end of device 17:47:18 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 361.614029] loop2: rw=12288, want=12296, limit=20 [ 361.616609] loop1: rw=12288, want=12296, limit=20 [ 361.630262] attempt to access beyond end of device [ 361.653962] loop2: rw=12288, want=8200, limit=20 17:47:18 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000100), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f00000002c0)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x200}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000008c0)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="5e03912748663cf2d2d54b9de67ef32fc3598e8c4b43cd95060ae251ea2f73a38b78c4bc5be30c01351a55793af7cb20a597adcea774b5e711e65404d36b50b15019032ebb3e3d044c0e369d2e7cd5bc2b55f5fd8d1eb7d49694b9a3744d31e8ec2ac8fb27e879c936b3f4be823af0fb59dd54eaf65c7567050177b4e6bf6dc96c9767f4cb8d7c5aff5b42a09c7421b93dbb8fe6ffd55a9a5b6ae2803ffde7bca4fe7241cf383b8fb9c0e83a3b30c12b"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 361.675589] attempt to access beyond end of device 17:47:18 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup3(r3, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:18 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) [ 361.714743] loop2: rw=12288, want=12296, limit=20 [ 361.720815] attempt to access beyond end of device [ 361.752052] loop5: rw=12288, want=8200, limit=20 [ 361.775645] attempt to access beyond end of device 17:47:18 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x80000) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 361.803477] loop5: rw=12288, want=12296, limit=20 [ 361.842539] attempt to access beyond end of device [ 361.846953] attempt to access beyond end of device [ 361.855079] loop5: rw=12288, want=8200, limit=20 17:47:18 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 361.892148] attempt to access beyond end of device [ 361.892307] loop1: rw=12288, want=8200, limit=20 [ 361.907996] loop5: rw=12288, want=12296, limit=20 [ 361.939629] attempt to access beyond end of device [ 361.950172] attempt to access beyond end of device [ 361.958509] loop2: rw=12288, want=8200, limit=20 [ 361.972296] attempt to access beyond end of device [ 361.977800] loop1: rw=12288, want=12296, limit=20 [ 361.983698] loop2: rw=12288, want=12296, limit=20 17:47:18 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x1ff, 0x3, 0x100000, 0x2000, &(0x7f000000a000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1e, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r4, 0xc004aea7, &(0x7f0000000140)=0xfffffffe) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:18 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 362.033848] attempt to access beyond end of device [ 362.043542] attempt to access beyond end of device [ 362.048531] loop1: rw=12288, want=8200, limit=20 [ 362.059383] loop2: rw=12288, want=8200, limit=20 [ 362.089162] attempt to access beyond end of device [ 362.094627] attempt to access beyond end of device [ 362.101323] loop2: rw=12288, want=12296, limit=20 [ 362.114877] loop1: rw=12288, want=12296, limit=20 17:47:18 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x8}, 0x7483, 0xfffffffffffffffc, 0xfffffffe, 0x5, 0x0, 0x0, 0x20}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xa0) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000208a3d0692e40dee35831302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 362.156642] attempt to access beyond end of device 17:47:18 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 362.177217] loop5: rw=12288, want=8200, limit=20 [ 362.191942] attempt to access beyond end of device 17:47:18 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 362.237116] loop5: rw=12288, want=12296, limit=20 [ 362.255028] attempt to access beyond end of device [ 362.278825] loop5: rw=12288, want=8200, limit=20 [ 362.287884] attempt to access beyond end of device [ 362.303447] loop5: rw=12288, want=12296, limit=20 [ 362.318666] attempt to access beyond end of device 17:47:18 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 362.337055] loop2: rw=12288, want=8200, limit=20 [ 362.348109] attempt to access beyond end of device [ 362.358240] attempt to access beyond end of device [ 362.366551] loop1: rw=12288, want=8200, limit=20 [ 362.376769] loop2: rw=12288, want=12296, limit=20 17:47:18 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 362.383899] attempt to access beyond end of device [ 362.412410] attempt to access beyond end of device [ 362.419078] loop1: rw=12288, want=12296, limit=20 [ 362.452205] loop2: rw=12288, want=8200, limit=20 [ 362.461911] attempt to access beyond end of device 17:47:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept4$x25(r5, &(0x7f0000000140)={0x9, @remote}, &(0x7f0000000180)=0x12, 0x80000) [ 362.485532] attempt to access beyond end of device [ 362.495288] loop1: rw=12288, want=8200, limit=20 [ 362.518748] loop2: rw=12288, want=12296, limit=20 [ 362.528830] attempt to access beyond end of device 17:47:18 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}]}}) [ 362.532003] attempt to access beyond end of device [ 362.544593] loop1: rw=12288, want=12296, limit=20 17:47:18 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:18 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 362.579021] loop5: rw=12288, want=8200, limit=20 17:47:19 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r2 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r1, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 362.621434] attempt to access beyond end of device [ 362.645448] attempt to access beyond end of device [ 362.654615] loop5: rw=12288, want=12296, limit=20 [ 362.667616] loop2: rw=12288, want=8200, limit=20 [ 362.677804] attempt to access beyond end of device [ 362.698005] attempt to access beyond end of device [ 362.712880] attempt to access beyond end of device [ 362.721535] loop5: rw=12288, want=8200, limit=20 [ 362.728680] loop1: rw=12288, want=8200, limit=20 [ 362.742670] loop2: rw=12288, want=12296, limit=20 17:47:19 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}]}}) [ 362.748860] attempt to access beyond end of device [ 362.757285] attempt to access beyond end of device [ 362.766333] attempt to access beyond end of device [ 362.774202] loop5: rw=12288, want=12296, limit=20 [ 362.781605] loop1: rw=12288, want=12296, limit=20 [ 362.791463] loop2: rw=12288, want=8200, limit=20 17:47:19 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x4041) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000b40)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="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", @ANYRES32, @ANYBLOB="0800010030303a30303a31302e1a0000000008008b00", @ANYRES32=r3, @ANYBLOB="80acf826eee56de243efbe482d8164048a6c20ab97be31a206f16066f83c571bd9748db4228b3afee0fc0984d8dcac95a309ba5f6e066b68edf4fb00c41d2639d5f436aae271a5b9b104d6395db0edfbd3c83843587a00afde8487200923fd5d6de6da8fdc95779e1f76a7"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:19 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 362.797948] attempt to access beyond end of device [ 362.809595] attempt to access beyond end of device [ 362.818077] loop1: rw=12288, want=8200, limit=20 [ 362.829782] loop2: rw=12288, want=12296, limit=20 [ 362.862017] attempt to access beyond end of device [ 362.878387] loop1: rw=12288, want=12296, limit=20 17:47:19 executing program 4: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}]}}) 17:47:19 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01000000000000000000090000003000038008000100000000fb130002007663616e30000000000000000000000008000300000000000600040009000000ddcc71c0109ecd024de3d9a1db7dd4e3deb795898c02d2bb217666963335bfe4e17fdbbbd40406abed"], 0x44}}, 0x0) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x5c, r4, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x401}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xf8a7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x822b}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1ff}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0xc0}, 0x1d9aaaf724d5db2d) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x100000, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r6, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r7, 0xae9a) ioctl$KVM_RUN(r7, 0xae80, 0x0) 17:47:19 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 362.967235] attempt to access beyond end of device [ 363.000784] loop5: rw=12288, want=8200, limit=20 [ 363.036190] attempt to access beyond end of device [ 363.041378] attempt to access beyond end of device [ 363.046156] loop1: rw=12288, want=8200, limit=20 [ 363.071019] attempt to access beyond end of device [ 363.076395] attempt to access beyond end of device [ 363.080681] loop5: rw=12288, want=12296, limit=20 [ 363.094258] loop2: rw=12288, want=8200, limit=20 [ 363.106472] attempt to access beyond end of device [ 363.115930] attempt to access beyond end of device [ 363.132794] loop5: rw=12288, want=8200, limit=20 [ 363.135035] loop1: rw=12288, want=12296, limit=20 17:47:19 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x8}, 0x7483, 0xfffffffffffffffc, 0xfffffffe, 0x5, 0x0, 0x0, 0x20}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xa0) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000208a3d0692e40dee35831302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 363.144122] loop2: rw=12288, want=12296, limit=20 [ 363.156112] attempt to access beyond end of device [ 363.164133] attempt to access beyond end of device [ 363.175131] loop5: rw=12288, want=12296, limit=20 [ 363.183581] loop2: rw=12288, want=8200, limit=20 [ 363.187923] attempt to access beyond end of device [ 363.211994] attempt to access beyond end of device [ 363.222325] loop1: rw=12288, want=8200, limit=20 [ 363.223923] loop2: rw=12288, want=12296, limit=20 [ 363.240588] print_req_error: I/O error, dev loop5, sector 16 [ 363.256490] attempt to access beyond end of device 17:47:19 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x3, 0x28c702) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xffffffffffffffad, &(0x7f0000000480)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES16=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:19 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 363.277522] loop1: rw=12288, want=12296, limit=20 17:47:19 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r2, r3, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 363.340287] print_req_error: I/O error, dev loop2, sector 16 17:47:19 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup3(r3, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:19 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x4041) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000b40)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="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", @ANYRES32, @ANYBLOB="0800010030303a30303a31302e1a0000000008008b00", @ANYRES32=r3, @ANYBLOB="80acf826eee56de243efbe482d8164048a6c20ab97be31a206f16066f83c571bd9748db4228b3afee0fc0984d8dcac95a309ba5f6e066b68edf4fb00c41d2639d5f436aae271a5b9b104d6395db0edfbd3c83843587a00afde8487200923fd5d6de6da8fdc95779e1f76a7"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 363.422807] attempt to access beyond end of device [ 363.430939] loop5: rw=12288, want=8200, limit=20 [ 363.435968] attempt to access beyond end of device 17:47:19 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x3, 0x0, 0x0, 0x7fff}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3673f3af31d34bbe8cc340008008c0003000000080001007063690011000200303130303a303000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 363.473894] attempt to access beyond end of device [ 363.478867] loop1: rw=12288, want=8200, limit=20 [ 363.486639] loop5: rw=12288, want=12296, limit=20 [ 363.496065] attempt to access beyond end of device [ 363.515338] attempt to access beyond end of device [ 363.520442] loop5: rw=12288, want=8200, limit=20 [ 363.525303] attempt to access beyond end of device [ 363.532473] loop1: rw=12288, want=12296, limit=20 [ 363.537864] attempt to access beyond end of device [ 363.548244] attempt to access beyond end of device [ 363.558851] loop2: rw=12288, want=8200, limit=20 17:47:19 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x4041) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000b40)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="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", @ANYRES32, @ANYBLOB="0800010030303a30303a31302e1a0000000008008b00", @ANYRES32=r3, @ANYBLOB="80acf826eee56de243efbe482d8164048a6c20ab97be31a206f16066f83c571bd9748db4228b3afee0fc0984d8dcac95a309ba5f6e066b68edf4fb00c41d2639d5f436aae271a5b9b104d6395db0edfbd3c83843587a00afde8487200923fd5d6de6da8fdc95779e1f76a7"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$cgroup_ro(r6, &(0x7f0000000d80)='pids.events\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f00000002c0)={0xa0, 0x0, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8}, {0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xc1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x77}, @NBD_ATTR_SOCKETS={0x4c, 0x7, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8, 0x1, r3}, {0x8, 0x1, r7}, {0x8}]}]}, 0xa0}}, 0x1) [ 363.570436] loop5: rw=12288, want=12296, limit=20 [ 363.576726] attempt to access beyond end of device [ 363.585582] loop1: rw=12288, want=8200, limit=20 [ 363.594502] loop2: rw=12288, want=12296, limit=20 [ 363.613325] attempt to access beyond end of device [ 363.643738] attempt to access beyond end of device [ 363.660347] loop1: rw=12288, want=12296, limit=20 17:47:20 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 363.686093] loop2: rw=12288, want=8200, limit=20 [ 363.702032] attempt to access beyond end of device [ 363.723801] loop2: rw=12288, want=12296, limit=20 17:47:20 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:20 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup3(r3, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:20 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x4041) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000b40)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="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", @ANYRES32, @ANYBLOB="0800010030303a30303a31302e1a0000000008008b00", @ANYRES32=r3, @ANYBLOB="80acf826eee56de243efbe482d8164048a6c20ab97be31a206f16066f83c571bd9748db4228b3afee0fc0984d8dcac95a309ba5f6e066b68edf4fb00c41d2639d5f436aae271a5b9b104d6395db0edfbd3c83843587a00afde8487200923fd5d6de6da8fdc95779e1f76a7"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 363.796784] attempt to access beyond end of device [ 363.839924] loop5: rw=12288, want=8200, limit=20 17:47:20 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000840)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYRESHEX, @ANYRES32=r3, @ANYBLOB="7ccb233d3c50bb792486bec087bbeb8a1ea0964122b1d894003ece8a4b83a79d448e64b51b0b30b7cfd282770cbad4223915"], 0xa4}, 0x1, 0x0, 0x0, 0x8000}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 363.864448] attempt to access beyond end of device [ 363.876023] attempt to access beyond end of device [ 363.886601] loop5: rw=12288, want=12296, limit=20 [ 363.889168] attempt to access beyond end of device [ 363.932294] loop2: rw=12288, want=8200, limit=20 [ 363.937756] attempt to access beyond end of device [ 363.947236] loop1: rw=12288, want=8200, limit=20 [ 363.972361] attempt to access beyond end of device [ 363.977291] loop5: rw=12288, want=8200, limit=20 [ 363.981880] attempt to access beyond end of device [ 363.996814] loop2: rw=12288, want=12296, limit=20 [ 364.021432] attempt to access beyond end of device 17:47:20 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x3, 0x28c702) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xffffffffffffffad, &(0x7f0000000480)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES16=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 364.023122] loop1: rw=12288, want=12296, limit=20 17:47:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x1, &(0x7f0000000140)=0x5, 0x9) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SETDUPLEX(r5, 0x5016, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0000000000000000040000000a00010062617369630000000c0002000800010000000000"], 0x3c}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xe410774411c4ff27}, 0xc, &(0x7f0000000180)={&(0x7f00000005c0)={0x9c, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x18, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}, @ETHTOOL_A_STRSET_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_STRSET_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) [ 364.078057] loop5: rw=12288, want=12296, limit=20 [ 364.103311] attempt to access beyond end of device [ 364.126589] attempt to access beyond end of device 17:47:20 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x40010022, 0x0, 0xfffffdf8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0xfff, 0x7, 0x20, 0x1000, 0x3}, &(0x7f00000002c0)=0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:20 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:20 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x4041) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000b40)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="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", @ANYRES32, @ANYBLOB="0800010030303a30303a31302e1a0000000008008b00", @ANYRES32=r3, @ANYBLOB="80acf826eee56de243efbe482d8164048a6c20ab97be31a206f16066f83c571bd9748db4228b3afee0fc0984d8dcac95a309ba5f6e066b68edf4fb00c41d2639d5f436aae271a5b9b104d6395db0edfbd3c83843587a00afde8487200923fd5d6de6da8fdc95779e1f76a7"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 364.167285] loop2: rw=12288, want=8200, limit=20 [ 364.182781] loop1: rw=12288, want=8200, limit=20 [ 364.199644] attempt to access beyond end of device [ 364.234541] attempt to access beyond end of device [ 364.247012] loop2: rw=12288, want=12296, limit=20 [ 364.275320] loop1: rw=12288, want=12296, limit=20 [ 364.281268] attempt to access beyond end of device [ 364.325520] loop5: rw=12288, want=8200, limit=20 17:47:20 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x80000) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 364.357652] attempt to access beyond end of device [ 364.390388] loop5: rw=12288, want=12296, limit=20 17:47:20 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup3(r3, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:20 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 364.416362] attempt to access beyond end of device [ 364.452556] loop5: rw=12288, want=8200, limit=20 [ 364.464873] attempt to access beyond end of device [ 364.484588] attempt to access beyond end of device [ 364.500734] loop4: rw=12288, want=8200, limit=20 [ 364.515659] loop5: rw=12288, want=12296, limit=20 [ 364.521531] attempt to access beyond end of device [ 364.521544] loop2: rw=12288, want=8200, limit=20 [ 364.522412] attempt to access beyond end of device [ 364.536754] attempt to access beyond end of device [ 364.547432] attempt to access beyond end of device 17:47:20 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000100)=0xfffffffd) sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000880)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="ce3a00007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="b0e92caf44a1c191cc851b698602c8a4e40eb84268ecf30546f1f0a1ebe43686a279626a55e457a4ee446fce1b1a514b516316a4ec45b015cb593261227ddc06d6cf452d4bc0b270b4128ada3bfa725031701ad68f50587c40f43a10496ce13f46b059218be3601840772cededc31ebc79daee1adefbf0fdeeb81c1987722277ea059a7c86571b7a08b97934e1ab8acac883a9e19d26bf"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x1, 0x1ff, 0x7, 0x7}) [ 364.562634] loop4: rw=12288, want=12296, limit=20 [ 364.581995] loop1: rw=12288, want=8200, limit=20 [ 364.603157] loop2: rw=12288, want=12296, limit=20 [ 364.612628] attempt to access beyond end of device 17:47:21 executing program 5: syz_mount_image$f2fs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 364.615248] attempt to access beyond end of device [ 364.641259] attempt to access beyond end of device [ 364.648706] loop4: rw=12288, want=8200, limit=20 [ 364.663092] loop1: rw=12288, want=12296, limit=20 [ 364.675020] attempt to access beyond end of device [ 364.677213] loop2: rw=12288, want=8200, limit=20 [ 364.698649] attempt to access beyond end of device [ 364.704350] attempt to access beyond end of device [ 364.706685] loop4: rw=12288, want=12296, limit=20 [ 364.726883] loop2: rw=12288, want=12296, limit=20 [ 364.735507] loop1: rw=12288, want=8200, limit=20 17:47:21 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 364.773819] attempt to access beyond end of device 17:47:21 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 364.812164] loop1: rw=12288, want=12296, limit=20 17:47:21 executing program 5: syz_mount_image$f2fs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000140)=0x8, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:21 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:21 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x80000) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 364.937966] attempt to access beyond end of device [ 364.974933] loop2: rw=12288, want=8200, limit=20 [ 365.005268] attempt to access beyond end of device [ 365.035145] attempt to access beyond end of device [ 365.041714] loop2: rw=12288, want=12296, limit=20 [ 365.065513] attempt to access beyond end of device [ 365.078520] loop1: rw=12288, want=8200, limit=20 17:47:21 executing program 5: syz_mount_image$f2fs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:21 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x84080, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000840)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="08000100706369b1ffa057c49a3a90303a2b303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a3030000000000000009740e78b54c87e7309d38ff769a03459eda7fb4e33b431cdc8c671141f6e00a9c584f80f9c9b33df1d36aad3afa6d00d9c280bced700000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000002c0)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 365.085393] attempt to access beyond end of device [ 365.105080] loop4: rw=12288, want=8200, limit=20 [ 365.121183] attempt to access beyond end of device [ 365.128771] loop2: rw=12288, want=8200, limit=20 [ 365.148375] attempt to access beyond end of device [ 365.161835] loop1: rw=12288, want=12296, limit=20 [ 365.163458] attempt to access beyond end of device [ 365.186054] loop4: rw=12288, want=12296, limit=20 [ 365.194376] attempt to access beyond end of device [ 365.220139] loop2: rw=12288, want=12296, limit=20 [ 365.224466] loop1: rw=12288, want=8200, limit=20 [ 365.233052] attempt to access beyond end of device [ 365.264783] loop4: rw=12288, want=8200, limit=20 [ 365.273849] attempt to access beyond end of device [ 365.295524] attempt to access beyond end of device [ 365.306487] loop1: rw=12288, want=12296, limit=20 [ 365.328760] loop4: rw=12288, want=12296, limit=20 17:47:21 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:21 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:21 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a03042e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 365.361124] print_req_error: I/O error, dev loop1, sector 16 17:47:21 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 365.480093] attempt to access beyond end of device 17:47:21 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r4, 0x80000) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 365.528907] loop2: rw=12288, want=8200, limit=20 [ 365.565885] attempt to access beyond end of device [ 365.568467] attempt to access beyond end of device [ 365.591902] loop2: rw=12288, want=12296, limit=20 17:47:21 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 365.618788] attempt to access beyond end of device [ 365.633318] loop1: rw=12288, want=8200, limit=20 [ 365.640154] attempt to access beyond end of device [ 365.660955] attempt to access beyond end of device [ 365.666724] loop2: rw=12288, want=8200, limit=20 [ 365.672820] loop4: rw=12288, want=8200, limit=20 [ 365.693033] attempt to access beyond end of device [ 365.698086] loop1: rw=12288, want=12296, limit=20 [ 365.704551] attempt to access beyond end of device [ 365.727717] loop2: rw=12288, want=12296, limit=20 [ 365.734378] loop4: rw=12288, want=12296, limit=20 [ 365.748142] attempt to access beyond end of device [ 365.758757] attempt to access beyond end of device 17:47:22 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES16=r3, @ANYBLOB="040029bd7000ffdbdf25010000000000000002410000001800136574683a76657468315f746f5f68737200000000"], 0x34}, 0x1, 0x0, 0x0, 0x40000084}, 0x1) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r3, 0x800, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1e, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000140)={0x101ff, 0x2, 0x10000, 0x2000, &(0x7f0000016000/0x2000)=nil}) 17:47:22 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x803, 0x125840) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="08000100f06369001100023adef046fbcf2a3830301a31d00f0100000000000700000000000000", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 365.778672] loop1: rw=12288, want=8200, limit=20 [ 365.783633] loop4: rw=12288, want=8200, limit=20 [ 365.783781] attempt to access beyond end of device 17:47:22 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 365.824600] attempt to access beyond end of device [ 365.849689] loop1: rw=12288, want=12296, limit=20 [ 365.860988] loop4: rw=12288, want=12296, limit=20 17:47:22 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0800010070636900110002ec2f3030303a30303a31302e3000000035e3227d93180008008c00030000000800010070303130303a303000000000000000000000000000001a86f37f74c7067b9bcd4cb06d66b2665305c70f32d225ac25266a88d3a6c842cf24e0a1e4e7acbfbe0752af77825f5e10eba4a5116cf3263173482d02db1002f4334b77eb041e3f44ec24fcf5f29c116309b14e4ce3c6a9a91dcd2470169a7790dc3b300abd3a51ac2587e78a7fe487ed04d2532ac70f24a1957de1a66575eaf380924b570f335978af6f1ef1bdecc50bc9c1751c7d60f385ab41392ac296fa", @ANYRES32, @ANYBLOB="080001007063690011000200303030703a30303a31302e30000000060800cb93b258cd54aa3cbe1dac8b00", @ANYRES32=r3, @ANYBLOB="163e5ff91fd7326da04d060f152c510211fef80d"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312f1ff15a1e6e5a3967972f6fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d9074b93051cd8f683fe4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3d816102986", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:22 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:47:22 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 365.968179] f2fs_msg: 349 callbacks suppressed [ 365.968189] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 17:47:22 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 366.075282] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 366.112892] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 366.147892] F2FS-fs (loop2): Fix alignment : done, start(5120) end(13312) block(7168) [ 366.148915] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 366.176576] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 366.206258] attempt to access beyond end of device [ 366.233552] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 366.243369] loop2: rw=12288, want=8200, limit=20 [ 366.266748] F2FS-fs (loop2): invalid crc value [ 366.268412] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 366.280071] print_req_error: I/O error, dev loop4, sector 0 [ 366.287466] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 366.310228] attempt to access beyond end of device [ 366.331624] attempt to access beyond end of device 17:47:22 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:47:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 366.359755] loop4: rw=12288, want=8200, limit=20 [ 366.362139] loop2: rw=12288, want=12296, limit=20 [ 366.370493] attempt to access beyond end of device [ 366.389395] attempt to access beyond end of device [ 366.397893] loop1: rw=12288, want=8200, limit=20 [ 366.411872] loop4: rw=12288, want=12296, limit=20 [ 366.418463] attempt to access beyond end of device [ 366.436139] attempt to access beyond end of device [ 366.437737] attempt to access beyond end of device [ 366.452085] loop1: rw=12288, want=12296, limit=20 [ 366.456253] loop2: rw=12288, want=8200, limit=20 17:47:22 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 366.461566] loop4: rw=12288, want=8200, limit=20 [ 366.478153] attempt to access beyond end of device [ 366.491323] attempt to access beyond end of device [ 366.496889] attempt to access beyond end of device [ 366.505893] loop1: rw=12288, want=8200, limit=20 [ 366.505988] attempt to access beyond end of device [ 366.505996] loop1: rw=12288, want=12296, limit=20 [ 366.516591] loop4: rw=12288, want=12296, limit=20 [ 366.559016] loop2: rw=12288, want=12296, limit=20 17:47:22 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:22 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:47:23 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r2, r3, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:23 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 366.736208] attempt to access beyond end of device [ 366.763521] loop1: rw=12288, want=8200, limit=20 17:47:23 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 17:47:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x410240, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000640)='trusted.overlay.nlink\x00', &(0x7f0000000680)={'U-', 0xfffffffffffffff7}, 0x16, 0x1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcsa\x00', 0xc902, 0x0) ioctl$sock_x25_SIOCDELRT(r4, 0x890c, &(0x7f0000000540)={@remote={[], 0x1}, 0x7, 'veth1_macvtap\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@empty, @in6=@loopback}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f00000002c0)=0xe8) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000440)=ANY=[@ANYBLOB="e80000009a239fabd9069a07dd410d0917e0829f5a700747feb3b638844128f5634767725a8dd3bcab3f84f42360dafc478416eb01a8b44c99c4aeb216e9ac2782c01be29d58b86d3fbf70db8282e4e67ffd7d050000006e792b064a56a6925c5bcbd79a70edf4450de5433c5dc5794a3046f88b6fb0360004000000000000e8cbd34bd8a7105a978badd1779ee9e22d82b6d6a0d78270dc46b7009bf90509985dec0975080314c73cccc14ad32913b59b642bea90800608d13452e404694c7ab2c38ee22690b5e4195969b4a2c65006affbb2c964f2645afe5b560b977722aaf30c00"/248]) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 366.794246] attempt to access beyond end of device 17:47:23 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="e125919819bb33fc497b0eb3fd2b36a61c54566f4b41"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 366.821607] attempt to access beyond end of device [ 366.827272] attempt to access beyond end of device [ 366.837580] loop1: rw=12288, want=12296, limit=20 [ 366.850049] loop2: rw=12288, want=8200, limit=20 [ 366.857016] loop4: rw=12288, want=8200, limit=20 [ 366.864944] attempt to access beyond end of device [ 366.872083] attempt to access beyond end of device [ 366.877336] attempt to access beyond end of device [ 366.882800] loop1: rw=12288, want=8200, limit=20 [ 366.888213] loop2: rw=12288, want=12296, limit=20 [ 366.893960] loop4: rw=12288, want=12296, limit=20 [ 366.899651] attempt to access beyond end of device [ 366.905319] attempt to access beyond end of device [ 366.911290] attempt to access beyond end of device [ 366.916772] loop1: rw=12288, want=12296, limit=20 17:47:23 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 17:47:23 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 366.922299] loop2: rw=12288, want=8200, limit=20 [ 366.927767] loop4: rw=12288, want=8200, limit=20 [ 366.934226] attempt to access beyond end of device [ 366.946994] attempt to access beyond end of device [ 366.952898] loop2: rw=12288, want=12296, limit=20 [ 366.960679] loop4: rw=12288, want=12296, limit=20 17:47:23 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:23 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 367.075733] attempt to access beyond end of device [ 367.103171] loop1: rw=12288, want=8200, limit=20 [ 367.115590] attempt to access beyond end of device [ 367.128215] loop1: rw=12288, want=12296, limit=20 [ 367.141802] attempt to access beyond end of device [ 367.147852] attempt to access beyond end of device 17:47:23 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 17:47:23 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c00030000000800010070636900110002003031303032303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 367.155775] loop2: rw=12288, want=8200, limit=20 [ 367.160981] loop1: rw=12288, want=8200, limit=20 [ 367.166126] attempt to access beyond end of device [ 367.177840] attempt to access beyond end of device [ 367.183114] loop2: rw=12288, want=12296, limit=20 [ 367.189070] loop1: rw=12288, want=12296, limit=20 [ 367.198367] attempt to access beyond end of device 17:47:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x18101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x7f}, 0x5120b, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000500)={r3, 0x63c, "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"}, &(0x7f00000001c0)=0x644) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)={r3, 0x6e, "31facdfc01ed423dde4858e6285092604d05f59819538c5194116830e2d11ab65b311fc06eb82fc51bad68cefbcd02c0516c3bf36148160ed31afa102a5862b81875f4aac7453acb99a85304245366126cc4abfb321db349fd52f391bd0282203ed130161b6298cb1484fb945b61"}, &(0x7f00000001c0)=0x76) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 367.226230] attempt to access beyond end of device [ 367.253043] loop2: rw=12288, want=8200, limit=20 [ 367.258144] loop4: rw=12288, want=8200, limit=20 [ 367.269852] attempt to access beyond end of device [ 367.276313] attempt to access beyond end of device 17:47:23 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 367.302675] loop2: rw=12288, want=12296, limit=20 [ 367.311783] loop4: rw=12288, want=12296, limit=20 [ 367.327993] attempt to access beyond end of device [ 367.341200] loop4: rw=12288, want=8200, limit=20 [ 367.348793] attempt to access beyond end of device 17:47:23 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1400}], 0x0, 0x0) 17:47:23 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 367.383824] attempt to access beyond end of device [ 367.394959] loop4: rw=12288, want=12296, limit=20 [ 367.418299] loop1: rw=12288, want=8200, limit=20 [ 367.444195] attempt to access beyond end of device 17:47:23 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 367.483247] loop1: rw=12288, want=12296, limit=20 [ 367.521773] attempt to access beyond end of device [ 367.531935] attempt to access beyond end of device 17:47:23 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1400}], 0x0, 0x0) 17:47:23 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x36121, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 367.562746] loop1: rw=12288, want=8200, limit=20 [ 367.567141] loop2: rw=12288, want=8200, limit=20 [ 367.588890] attempt to access beyond end of device [ 367.598553] attempt to access beyond end of device [ 367.614345] attempt to access beyond end of device [ 367.617021] loop2: rw=12288, want=12296, limit=20 [ 367.636187] loop1: rw=12288, want=12296, limit=20 [ 367.638305] attempt to access beyond end of device [ 367.644873] loop4: rw=12288, want=8200, limit=20 [ 367.654107] loop2: rw=12288, want=8200, limit=20 17:47:24 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 367.673404] attempt to access beyond end of device [ 367.685472] loop4: rw=12288, want=12296, limit=20 [ 367.690218] attempt to access beyond end of device [ 367.696880] attempt to access beyond end of device [ 367.733191] loop2: rw=12288, want=12296, limit=20 17:47:24 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1400}], 0x0, 0x0) [ 367.770463] loop4: rw=12288, want=8200, limit=20 [ 367.789415] attempt to access beyond end of device [ 367.789429] loop4: rw=12288, want=12296, limit=20 17:47:24 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 367.839888] attempt to access beyond end of device 17:47:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="5800000024000705000000000000000000000008", @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100736662"], 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000e00)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x4}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8}]}}]}, 0x3c}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80020010}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)={0x264, 0x0, 0x100, 0x0, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x28, 0x2, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x48, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x188, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xbdca5358b55b081d}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xa}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xa}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}, @ETHTOOL_A_STRSET_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x28, 0x2, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xb}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}]}]}, 0x264}, 0x1, 0x0, 0x0, 0xc080}, 0x24008001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 367.862758] loop1: rw=12288, want=8200, limit=20 [ 367.878735] attempt to access beyond end of device 17:47:24 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:24 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040), 0x0, 0x1400}], 0x0, 0x0) [ 367.903023] loop1: rw=12288, want=12296, limit=20 [ 367.940813] attempt to access beyond end of device [ 367.964399] attempt to access beyond end of device [ 367.972996] loop1: rw=12288, want=8200, limit=20 [ 367.985746] loop2: rw=12288, want=8200, limit=20 [ 367.997794] attempt to access beyond end of device 17:47:24 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x87, 0x10040, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r0, &(0x7f0000000380)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x83}, 0x0) r2 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000780)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2323fb1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r1, @ANYBLOB="0800010070f999f3403adffc903030303a30000035e3227dc85da793180008008c0003000000080001007063690007000000000000003a303000000000000000000000a1e2dfef090045638da49356231721a5ebdf16f7ce609ebc5d271656d47a0594a22f50d72070f4878285f43323ef5a7de28489fca26f325fd65f8fad3692dde29a74013c6305db6c096211e459a7f48f109026000c89618cca3af0cf363face2685dac106a6d563f208ca83668ca1657b8250b585d955025824c068e8e41da1af6fedced0b5e10db702d8e06da734943186365cb54fd0e561dc783e1d7ae705986188100"/245, @ANYRES32, @ANYBLOB="080001007063690011040200303030303a30303a310000007a000d1edc004a57b6c7a45bb39214ee96", @ANYRES32=r2, @ANYBLOB="c79cc2eda01016f64032bfec82d1ee67b9e1e5e3c36b7d239840d2b6c1a1a7f824b2c8e38d18c23d1391dff465a88d8bef01d6ffb5a1780ca6441bc4eaa7f77754cdb6a168c2fa2f1d8edaff82b4a99dfafcab96dd5f596fb7b23f686ea088933f13f0fd77a86c2eed66489ae99aeaa645afbbfd937d611c0800000000000000de090c5be38fb19a3c88d3864f5c2a2367a09140a4d93094bfcb2d02ba052e4dca935174b90b9db0540c4408f7352b7e8f4b030360a167a1448b8714f27d5b90285def9bb9a4b91f8acec459fcb5e43c0987a9e0401aeba8607594cbfd8fb1"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x42, 0x404, 0x201, 0x40000, 0x3}) [ 368.011860] attempt to access beyond end of device [ 368.027337] loop1: rw=12288, want=12296, limit=20 [ 368.032374] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 368.043986] attempt to access beyond end of device 17:47:24 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040), 0x0, 0x1400}], 0x0, 0x0) [ 368.060735] loop4: rw=12288, want=8200, limit=20 [ 368.064496] loop2: rw=12288, want=12296, limit=20 [ 368.075864] attempt to access beyond end of device [ 368.085393] attempt to access beyond end of device [ 368.105395] loop4: rw=12288, want=12296, limit=20 17:47:24 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xee) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000a00)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f48901e6bc8b3555b77453a6bd389525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00a6af649c2d018b0290f2b2dc0080f9403e4742d3f3386b12a8f9af59375c1e3c036694198595e5e8f51a1ed48e54baa8b4117bf71e403902007e930684dd249a46ccc3c54727bc54bcf75977f03e093e754af2334ef4dd097cbd176f9f9b6da38de6cede56f357d16e0a0085283d506885738ddf", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 368.123788] attempt to access beyond end of device [ 368.129632] loop2: rw=12288, want=8200, limit=20 [ 368.154953] attempt to access beyond end of device 17:47:24 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 368.176845] loop2: rw=12288, want=12296, limit=20 [ 368.181025] loop4: rw=12288, want=8200, limit=20 [ 368.203635] attempt to access beyond end of device [ 368.219075] loop4: rw=12288, want=12296, limit=20 17:47:24 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040), 0x0, 0x1400}], 0x0, 0x0) 17:47:24 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:24 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 368.328598] attempt to access beyond end of device [ 368.342898] loop1: rw=12288, want=8200, limit=20 [ 368.361068] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 368.367495] attempt to access beyond end of device [ 368.374873] loop1: rw=12288, want=12296, limit=20 17:47:24 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e0000001800000002", 0x35, 0x1400}], 0x0, 0x0) 17:47:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r5, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 368.413405] attempt to access beyond end of device [ 368.425059] attempt to access beyond end of device [ 368.427695] loop1: rw=12288, want=8200, limit=20 [ 368.443005] attempt to access beyond end of device [ 368.454873] loop1: rw=12288, want=12296, limit=20 [ 368.460300] loop2: rw=12288, want=8200, limit=20 [ 368.482515] attempt to access beyond end of device [ 368.497201] loop2: rw=12288, want=12296, limit=20 [ 368.505110] attempt to access beyond end of device 17:47:24 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 368.515525] attempt to access beyond end of device [ 368.535144] loop2: rw=12288, want=8200, limit=20 [ 368.550775] loop4: rw=12288, want=8200, limit=20 [ 368.554209] attempt to access beyond end of device 17:47:24 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x200001ff, 0x40000, 0x7}) 17:47:25 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e0000001800000002", 0x35, 0x1400}], 0x0, 0x0) [ 368.573008] attempt to access beyond end of device [ 368.588023] loop2: rw=12288, want=12296, limit=20 [ 368.588166] loop4: rw=12288, want=12296, limit=20 [ 368.606423] attempt to access beyond end of device [ 368.630689] loop4: rw=12288, want=8200, limit=20 [ 368.652564] attempt to access beyond end of device [ 368.663193] attempt to access beyond end of device [ 368.682764] loop4: rw=12288, want=12296, limit=20 [ 368.689345] loop1: rw=12288, want=8200, limit=20 17:47:25 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 368.707358] attempt to access beyond end of device [ 368.729227] loop1: rw=12288, want=12296, limit=20 17:47:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x101, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000002c0)={r6, 0x800, 0x10, 0x100000000, 0x7}, &(0x7f0000000300)=0x18) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_SET_KEYBIT(r5, 0x40045565, 0x8d) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:25 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e0000001800000002", 0x35, 0x1400}], 0x0, 0x0) [ 368.758062] attempt to access beyond end of device 17:47:25 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x8051, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x2) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:25 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000100)=0x3, 0x4) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r2 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000900)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESOCT, @ANYRES32=r1, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x4, 0x40004, 0x2000007}) [ 368.805401] loop1: rw=12288, want=8200, limit=20 [ 368.824037] attempt to access beyond end of device [ 368.828370] attempt to access beyond end of device [ 368.854585] loop1: rw=12288, want=12296, limit=20 [ 368.862446] loop2: rw=12288, want=8200, limit=20 [ 368.883428] attempt to access beyond end of device [ 368.897907] attempt to access beyond end of device 17:47:25 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 368.900370] loop2: rw=12288, want=12296, limit=20 [ 368.913706] attempt to access beyond end of device [ 368.927801] loop4: rw=12288, want=8200, limit=20 [ 368.942048] loop2: rw=12288, want=8200, limit=20 [ 368.947304] attempt to access beyond end of device 17:47:25 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e00000000040000000400", 0x4f, 0x1400}], 0x0, 0x0) [ 368.954439] loop2: rw=12288, want=12296, limit=20 [ 368.988826] attempt to access beyond end of device 17:47:25 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x6, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000840)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe7ff98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af484061d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b0018316f8c9ef0abeac79e36479a3a8034350f9bc14de677fd11fc087146c1345cce7ae5eb8d39bb44f1fa11f657a64a285eef6d4ec7abef1ced8a8a9e282b389bbe627465e72e796051d3f28c6f", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 369.012158] loop4: rw=12288, want=12296, limit=20 [ 369.013257] attempt to access beyond end of device [ 369.038519] loop1: rw=12288, want=8200, limit=20 17:47:25 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = accept$netrom(r2, &(0x7f0000000140)={{0x3, @netrom}, [@default, @rose, @remote, @netrom, @default, @default, @rose, @netrom]}, &(0x7f00000001c0)=0x48) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f00000002c0)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 369.065365] attempt to access beyond end of device [ 369.081722] loop4: rw=12288, want=8200, limit=20 [ 369.088335] attempt to access beyond end of device [ 369.093782] attempt to access beyond end of device [ 369.098731] loop4: rw=12288, want=12296, limit=20 [ 369.110750] loop1: rw=12288, want=12296, limit=20 17:47:25 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e00000000040000000400", 0x4f, 0x1400}], 0x0, 0x0) [ 369.153625] attempt to access beyond end of device [ 369.158596] loop2: rw=12288, want=8200, limit=20 [ 369.162296] attempt to access beyond end of device [ 369.177861] attempt to access beyond end of device [ 369.178766] loop1: rw=12288, want=8200, limit=20 17:47:25 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 369.199219] loop2: rw=12288, want=12296, limit=20 [ 369.216613] attempt to access beyond end of device [ 369.220414] attempt to access beyond end of device [ 369.235031] loop2: rw=12288, want=8200, limit=20 [ 369.254372] attempt to access beyond end of device [ 369.255170] loop1: rw=12288, want=12296, limit=20 [ 369.274092] loop2: rw=12288, want=12296, limit=20 17:47:25 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e00000000040000000400", 0x4f, 0x1400}], 0x0, 0x0) 17:47:25 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:25 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 369.426581] attempt to access beyond end of device [ 369.444250] loop2: rw=12288, want=8200, limit=20 [ 369.454574] attempt to access beyond end of device [ 369.465643] attempt to access beyond end of device 17:47:25 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x40000000000100) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000300)=0x7ff5039) ioctl$KVM_NMI(r2, 0xae9a) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mmap(&(0x7f000000c000/0x1000)=nil, 0x1000, 0x1000008, 0x810, 0xffffffffffffffff, 0x62103000) ioctl$VIDIOC_G_EXT_CTRLS(r6, 0xc0205647, &(0x7f00000001c0)={0x9e0000, 0x2, 0x101, r2, 0x0, &(0x7f0000000180)={0x98090d, 0xb563, [], @p_u8=&(0x7f0000000140)=0x1f}}) ioctl$TCSETAF(r7, 0x5408, &(0x7f00000002c0)={0x1, 0x3, 0x8, 0x701, 0x0, "0ca55608809a2358"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 369.478498] loop4: rw=12288, want=8200, limit=20 [ 369.483672] loop2: rw=12288, want=12296, limit=20 [ 369.495596] attempt to access beyond end of device [ 369.505066] attempt to access beyond end of device [ 369.513878] loop1: rw=12288, want=8200, limit=20 [ 369.514338] attempt to access beyond end of device 17:47:25 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000", 0x5c, 0x1400}], 0x0, 0x0) [ 369.536502] loop4: rw=12288, want=12296, limit=20 [ 369.542231] loop2: rw=12288, want=8200, limit=20 [ 369.551299] attempt to access beyond end of device [ 369.565378] attempt to access beyond end of device [ 369.576551] loop1: rw=12288, want=12296, limit=20 [ 369.578225] attempt to access beyond end of device [ 369.604489] loop4: rw=12288, want=8200, limit=20 [ 369.605029] loop2: rw=12288, want=12296, limit=20 [ 369.626277] attempt to access beyond end of device 17:47:26 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000", 0x5c, 0x1400}], 0x0, 0x0) 17:47:26 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 369.632664] attempt to access beyond end of device [ 369.655574] loop1: rw=12288, want=8200, limit=20 [ 369.660963] loop4: rw=12288, want=12296, limit=20 [ 369.713748] attempt to access beyond end of device 17:47:26 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 369.751024] loop1: rw=12288, want=12296, limit=20 17:47:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r5, 0xc04064aa, &(0x7f00000002c0)={&(0x7f0000000140)=[0x0], &(0x7f0000000180)=[{}, {}], 0x128a3cc0, 0x0, [], 0x1, 0x2}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:26 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 369.850519] attempt to access beyond end of device 17:47:26 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x90017, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:26 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000", 0x5c, 0x1400}], 0x0, 0x0) [ 369.872537] attempt to access beyond end of device [ 369.886276] loop2: rw=12288, want=8200, limit=20 [ 369.917196] loop4: rw=12288, want=8200, limit=20 [ 369.920184] attempt to access beyond end of device [ 369.924535] attempt to access beyond end of device [ 369.934687] loop1: rw=12288, want=8200, limit=20 [ 369.939991] attempt to access beyond end of device [ 369.949493] loop2: rw=12288, want=12296, limit=20 [ 369.958743] loop4: rw=12288, want=12296, limit=20 [ 369.961688] attempt to access beyond end of device [ 369.966546] attempt to access beyond end of device [ 369.976483] attempt to access beyond end of device [ 369.979856] loop1: rw=12288, want=12296, limit=20 [ 369.994603] loop2: rw=12288, want=8200, limit=20 [ 370.000554] loop4: rw=12288, want=8200, limit=20 [ 370.005655] attempt to access beyond end of device [ 370.009507] attempt to access beyond end of device [ 370.013063] attempt to access beyond end of device [ 370.022670] loop2: rw=12288, want=12296, limit=20 [ 370.027766] loop1: rw=12288, want=8200, limit=20 [ 370.027770] loop4: rw=12288, want=12296, limit=20 17:47:26 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000", 0x63, 0x1400}], 0x0, 0x0) [ 370.059302] attempt to access beyond end of device [ 370.075405] loop1: rw=12288, want=12296, limit=20 17:47:26 executing program 4: syz_mount_image$f2fs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:26 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:26 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:26 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="70abcd3805a2ae615af9df51feb21591f6faf1da28b5e311000200303030303a", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 370.216887] attempt to access beyond end of device 17:47:26 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000", 0x63, 0x1400}], 0x0, 0x0) [ 370.242183] loop2: rw=12288, want=8200, limit=20 [ 370.263894] attempt to access beyond end of device [ 370.270393] attempt to access beyond end of device [ 370.283638] loop1: rw=12288, want=8200, limit=20 [ 370.296861] attempt to access beyond end of device 17:47:26 executing program 4: syz_mount_image$f2fs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 370.314613] loop2: rw=12288, want=12296, limit=20 [ 370.326924] loop1: rw=12288, want=12296, limit=20 [ 370.334654] attempt to access beyond end of device [ 370.343299] loop1: rw=12288, want=8200, limit=20 [ 370.354528] attempt to access beyond end of device [ 370.357770] attempt to access beyond end of device 17:47:26 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000", 0x63, 0x1400}], 0x0, 0x0) [ 370.373017] loop1: rw=12288, want=12296, limit=20 [ 370.383463] loop2: rw=12288, want=8200, limit=20 [ 370.401059] attempt to access beyond end of device 17:47:26 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 370.436357] loop2: rw=12288, want=12296, limit=20 17:47:26 executing program 4: syz_mount_image$f2fs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:26 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:26 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100", 0x66, 0x1400}], 0x0, 0x0) [ 370.564725] attempt to access beyond end of device 17:47:26 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 370.598043] loop1: rw=12288, want=8200, limit=20 [ 370.627752] attempt to access beyond end of device [ 370.645682] loop1: rw=12288, want=12296, limit=20 [ 370.667171] attempt to access beyond end of device [ 370.678752] attempt to access beyond end of device [ 370.689528] loop1: rw=12288, want=8200, limit=20 [ 370.695560] loop2: rw=12288, want=8200, limit=20 [ 370.705161] attempt to access beyond end of device [ 370.711589] attempt to access beyond end of device [ 370.722223] loop1: rw=12288, want=12296, limit=20 17:47:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x10, 0x3, 0x0) r6 = syz_genetlink_get_family_id$netlbl_calipso(0x0) sendmsg$NLBL_CALIPSO_C_REMOVE(r5, &(0x7f0000000400)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)={0x14, r6, 0x0, 0x78bd29}, 0x14}, 0x1, 0x0, 0x0, 0x24044050}, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r6, 0x200, 0x70bd25, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x4001}, 0x8810) 17:47:27 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 370.728088] loop2: rw=12288, want=12296, limit=20 [ 370.740548] attempt to access beyond end of device [ 370.752297] loop2: rw=12288, want=8200, limit=20 [ 370.762876] attempt to access beyond end of device 17:47:27 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100", 0x66, 0x1400}], 0x0, 0x0) 17:47:27 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0x72) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030a9cb0b7d955da32e51e3303a30303a3130", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 370.775505] loop2: rw=12288, want=12296, limit=20 17:47:27 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:27 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:27 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:27 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100", 0x66, 0x1400}], 0x0, 0x0) [ 370.994864] f2fs_msg: 561 callbacks suppressed [ 370.994873] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 371.020329] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 371.021635] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 17:47:27 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 371.027520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16705 comm=syz-executor.0 [ 371.066292] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 371.080991] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 371.101917] F2FS-fs (loop5): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 371.110016] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 371.124889] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 371.137307] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 371.146441] F2FS-fs (loop1): Fix alignment : done, start(5120) end(13312) block(7168) [ 371.162396] attempt to access beyond end of device [ 371.174166] attempt to access beyond end of device [ 371.183610] loop2: rw=12288, want=8200, limit=20 [ 371.188573] loop1: rw=12288, want=8200, limit=20 [ 371.198332] attempt to access beyond end of device 17:47:27 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:47:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r5, 0xc01864ba, &(0x7f0000000140)={0x100000001, 0x4, 0x4, 0x40404040}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:27 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000001400000300000001000000", 0x68, 0x1400}], 0x0, 0x0) [ 371.222684] attempt to access beyond end of device [ 371.234779] loop2: rw=12288, want=12296, limit=20 [ 371.242289] loop1: rw=12288, want=12296, limit=20 [ 371.252596] attempt to access beyond end of device [ 371.263019] attempt to access beyond end of device 17:47:27 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000a40)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="08000100703230303a30303a41e3c51425c5e6ac00008b00", @ANYRES32=r3, @ANYBLOB="af590a283f83382f496c6766e0dee77352b96f494fdeaa056d1d89e89848a6000b57cef55e443b2e1a7555ef2a4489ac201e8f4798841cf089551f85a3ae523ca4cb2950c4cae8593a7b8524d5b07845da8a99483bad769ea3fead7d5113f9e0c910ebb99e2d17d20ded887c0517fa470ae0b0c8fff745dc67188fc36ce9786ee08b7e4b9addc1"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 371.285950] loop2: rw=12288, want=8200, limit=20 [ 371.295284] loop1: rw=12288, want=8200, limit=20 [ 371.315609] attempt to access beyond end of device [ 371.328147] attempt to access beyond end of device 17:47:27 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 371.350557] loop2: rw=12288, want=12296, limit=20 [ 371.364408] loop1: rw=12288, want=12296, limit=20 17:47:27 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:27 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000001400000300000001000000", 0x68, 0x1400}], 0x0, 0x0) 17:47:27 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:27 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 371.552757] attempt to access beyond end of device [ 371.578581] loop2: rw=12288, want=8200, limit=20 17:47:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:28 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000001400000300000001000000", 0x68, 0x1400}], 0x0, 0x0) [ 371.599699] attempt to access beyond end of device [ 371.605369] attempt to access beyond end of device [ 371.612255] loop1: rw=12288, want=8200, limit=20 [ 371.618302] loop2: rw=12288, want=12296, limit=20 [ 371.630599] attempt to access beyond end of device [ 371.642903] attempt to access beyond end of device 17:47:28 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="08000100706369001100020030303030b5000800f76f093e27c686b6abb8513a8c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 371.648496] loop1: rw=12288, want=12296, limit=20 [ 371.658230] attempt to access beyond end of device [ 371.664280] loop2: rw=12288, want=8200, limit=20 [ 371.686715] attempt to access beyond end of device [ 371.694980] loop1: rw=12288, want=8200, limit=20 17:47:28 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 371.711152] loop2: rw=12288, want=12296, limit=20 [ 371.716712] attempt to access beyond end of device [ 371.768743] loop1: rw=12288, want=12296, limit=20 17:47:28 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:28 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69}], 0x0, 0x0) 17:47:28 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:28 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 371.966201] attempt to access beyond end of device 17:47:28 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69}], 0x0, 0x0) 17:47:28 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xfffffffffffffe40) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 371.994806] loop2: rw=12288, want=8200, limit=20 17:47:28 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1400}], 0x0, 0x0) [ 372.029605] attempt to access beyond end of device [ 372.073474] attempt to access beyond end of device [ 372.083076] loop1: rw=12288, want=8200, limit=20 [ 372.102067] loop2: rw=12288, want=12296, limit=20 [ 372.108440] attempt to access beyond end of device 17:47:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r5, 0xc0385720, &(0x7f00000001c0)={0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x2a0241, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000180)=0x1, 0x4) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 372.139458] loop1: rw=12288, want=12296, limit=20 [ 372.145878] attempt to access beyond end of device [ 372.168704] attempt to access beyond end of device [ 372.176089] loop2: rw=12288, want=8200, limit=20 17:47:28 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69}], 0x0, 0x0) 17:47:28 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1400}], 0x0, 0x0) [ 372.194099] attempt to access beyond end of device [ 372.199665] loop1: rw=12288, want=8200, limit=20 [ 372.215269] attempt to access beyond end of device [ 372.225674] loop2: rw=12288, want=12296, limit=20 [ 372.236539] loop1: rw=12288, want=12296, limit=20 17:47:28 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:28 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:28 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:28 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1400}], 0x0, 0x0) 17:47:28 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 372.524323] attempt to access beyond end of device [ 372.555138] loop2: rw=12288, want=8200, limit=20 [ 372.592323] attempt to access beyond end of device [ 372.592639] attempt to access beyond end of device [ 372.622438] loop5: rw=12288, want=8200, limit=20 [ 372.632949] attempt to access beyond end of device 17:47:29 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 372.644762] loop2: rw=12288, want=12296, limit=20 [ 372.654648] loop5: rw=12288, want=12296, limit=20 17:47:29 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040), 0x0, 0x1400}], 0x0, 0x0) 17:47:29 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 372.689804] attempt to access beyond end of device [ 372.700617] attempt to access beyond end of device [ 372.713065] loop2: rw=12288, want=8200, limit=20 [ 372.722858] loop5: rw=12288, want=8200, limit=20 [ 372.731254] attempt to access beyond end of device [ 372.739557] attempt to access beyond end of device [ 372.749303] loop2: rw=12288, want=12296, limit=20 [ 372.757409] loop5: rw=12288, want=12296, limit=20 17:47:29 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x3, 0x5, &(0x7f0000001480)=[{&(0x7f00000001c0)="83e76ae00cfab942f19008473718320ff48ebe0cdec201aba1fa1ca95eab1506fd285a75838a1e9b9d5fd7d4563a4b78d2df55235c6d8636", 0x38, 0x6ac}, {&(0x7f0000000440)="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", 0x1000, 0x1}, {&(0x7f00000002c0)="35935fc1b641d9b3d4bc345fac2b7320d616b0c00969ebd7798bdd447e9d60e9d47aec687e4538ad3258301a4a11dc0a4caad2757a8131c5c19c966756bec8211e04d3ea8800c19857b6082f7262e6b1cce2c7d8c0f58bd29ff288fbf6a8f5333657ba4e3e35cff0bb661735fe6999074d63ddaf87ab60448146ae73eeb5bc0ac9dca862935927f51d9d8ca81784743912bf4144d61dd0cb3df3dee279737f47b1f9", 0xa2, 0x75ef}, {&(0x7f0000000380)="312a40d32a20b94ac50f211e9eb89aa86b831b09d12e6147f8356dfd573e688719f489ad12ed6fd6a07bdb7103acc09058c8d5b014a0fe75bceb80d5960f2724d5d748fa62c1efa29f45187daa2348", 0x4f, 0x52}, {&(0x7f0000001440)="cd29442bb6cc3b3386d625129910665cf0e13c9481b79cf493e9797123e74f875eb4129cbd585ea5ed08fc16c62013714d46ad", 0x33, 0x7f}], 0x4, &(0x7f0000001500)={[{@utf8='utf8'}, {@dmode={'dmode', 0x3d, 0x96d}}, {@check_strict='check=strict'}], [{@fsmagic={'fsmagic', 0x3d, 0x707}}, {@obj_role={'obj_role', 0x3d, '/dev/kvm\x00'}}, {@pcr={'pcr', 0x3d, 0xa}}, {@appraise='appraise'}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '&{'}}, {@audit='audit'}, {@subj_role={'subj_role', 0x3d, '/dev/kvm\x00'}}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:29 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:29 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040), 0x0, 0x1400}], 0x0, 0x0) 17:47:29 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 372.936818] attempt to access beyond end of device [ 372.963948] loop2: rw=12288, want=8200, limit=20 [ 372.977970] attempt to access beyond end of device [ 373.001435] loop2: rw=12288, want=12296, limit=20 [ 373.018576] attempt to access beyond end of device 17:47:29 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040), 0x0, 0x1400}], 0x0, 0x0) 17:47:29 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:29 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000008c0)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="d4e5623f61fcb3154e51b1866e549126b7b7c8c1857dc9a21720ed6becbfbe7f5b63b767bda25aa0cbe3db226f7ca7f79950bd8693bedbeb4ba11b73a66609fef7864f096fa27444f08ab8778dcd5097edc814dd9361d780c87d6e4c651897f29d0cb6ef7717f4872d8876335b4e94d0469ddc780032c75d87879bae8ad40c31e0874c6308e1fd206faf3bd7952694dc1dc5c5fa88194f57ead2605ba1c0f12cf4da55478c4d3714226daf"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 373.100077] loop2: rw=12288, want=8200, limit=20 [ 373.124412] attempt to access beyond end of device [ 373.154673] loop2: rw=12288, want=12296, limit=20 17:47:29 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:29 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:29 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e0000001800000002", 0x35, 0x1400}], 0x0, 0x0) 17:47:29 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000140)=0x3) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 373.331410] attempt to access beyond end of device 17:47:29 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:29 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 373.385088] loop2: rw=12288, want=8200, limit=20 [ 373.396986] attempt to access beyond end of device 17:47:29 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e0000001800000002", 0x35, 0x1400}], 0x0, 0x0) [ 373.436292] loop2: rw=12288, want=12296, limit=20 [ 373.470303] attempt to access beyond end of device [ 373.503969] loop2: rw=12288, want=8200, limit=20 [ 373.540662] attempt to access beyond end of device 17:47:29 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e0000001800000002", 0x35, 0x1400}], 0x0, 0x0) 17:47:30 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 373.590067] print_req_error: I/O error, dev loop4, sector 16 [ 373.636010] loop2: rw=12288, want=12296, limit=20 17:47:30 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303930303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="b8cdf907679527c2f16bfb2f1d6268775ac292512f47ad65973f2fefa14088fbed06c777b4c44311b887c37935bff747a57b20e0db7e30191109f496fb93cc81d86539161c22f6fdcba5a6"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40040000, 0x7}) 17:47:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:30 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000500)={r4, 0x63c, "6f931d8881df086d8cbb25585d041f396a3df12105a60181f100cd946f04befd42d1fd8331bf8ac0cc7e1d2d9819082c22651a81290b7e179eb6f2cc0f23796d62cb953b8e1ff22e0f954c90b28d8cc987e47b6b3cc170200c296fbe955112ef8d064bfbbd03e84d9d1cabcbbd1add1a7ebfd3a6a6a0e5ff84e8c72734647a5b213198e910ce12312bbfaeededd6116111c7b693bb198e4770fcce5d384c385c93335dc09e6eab7d1f2054e509e0e6d8a2599759c33ae15edc55278e50dfda641cbc1834e23f69d807a3af611bcd7b31c37a0da53c1680451f91e5b5156f83d705d0721d5e746ecbc536f08850ae28bcd96a38e06cb22d3198d6d8982474d1887cb48974536266cd175a97e6010331d3a8c5f0941058a1ff5b5b810cf9b52664895ccc5918abdd528e15a3fc88c5f5065e685b6997affb394ab6238cf0d3a4f4892bcd0c2f891493f1f9565db5c630ee25d88be47c5e3d120886b9c96a246761b15b730fdb4667e8a6cb6346790002eb71262b886d2f444deefbb51ed8525a24ad382381acb339d4b695f87a20e1d872618713344eb39443ab6650edad81ae3932a0671e9b4a224ebe26e0781d59dd48b88daa34264327b56b20dabd0fe526a798224ef58a1e24ccfacb299e9c0722046d05e291ebb968f964ef01a2c53b9f755f85522b9fa8b40f62a58e83105d00aac8e1b39d5bc594a2d748bdd6c051e1490653d3948ae0ddb440a2094ca3db47fd790472a8cbde2d4575afea5d2747a871cf84ba1ea4c44c5bcdbd1f474bec6c86babcff030027a0ff2666844857d11deceb04997cfa6b012bf89dc92816c23579f6f08296fc17c6d0467517e7bedb2e9f8242610dc384cccacd2ede17ce895dd19fa37c78b6ddc859e97460d24b38fd45bc6ea95d47f8f010cc0b284e37e17e7d8ac8ba4d8c2bcad88aa962079d9a4e3a3ef6c2a15441e2a4d8f8f7037b3a4a351dad0ba4df0c6a2e782de475c92f486b4f038967380e90c4d217ec97d8ec00a4666bc9f4956f1ea9b5c2f25e021662433605eef360fdea93b913ddef78d69cb03d16180e442eef250c3002c6d048ba93de26a2510c0743b3c32c2ec7b7a62a83a29dac97cf6c3eba0a6830592b7d3f63b9923955e834b735e92510052ba3786cecdc29f635240a6cecb37235b7cec371562dda5e786ff3653516eed5f77f8ef75724e4062e289c9a02d036ee9de74ab22d7f64d6f963e4dd2add5b18ebf0aed76472d67165648427264f3ad7cdf4eee72e6cfd9524932f576f8d71e898403e5bad17d8410d42313bc7ef981821dcd607a857d5ead6a1bfbbd1e10618cecd887313cada3e009253eb2a92c26227e39bfc9091bde7eb47f511fadb735e75cc1bb9917b8bf7977c5b7fc08835c5ea3211aedd8aed76a7cf43d43ead3c123fda89c3ca493a3da6f54196fa0a008a71260fcf50a534b458667dae4beca9201fae917321895ac89433bdafd49de93dacdd4dc2a6f19237b5f33838853306cd614d82ad699c23240e502e1b24ebc8d540ca19d8f13f08c99fe9346c117a378393b7798b5309cb36230d12caaef2edaf27d8c8944a2bb86ee60bdcdc3c0c1cd9cae4e5c4b6a02730b426a95a8d153b836093617d5b1f917a36b2c051e4469786c3397ba9a42e6ffebdc49256bdf4d5c8bab52d295f4794d2ac0e6e29d89118afdb5755ccf82aedd1019d710630e8c8c5f3fd6d0ab674d79ec3cd5c211a09aa90eb85b53ba00d0973c4b4a1de855aaebf967311d7283bd8d3ef888c278ae8d66da669af9c7698d779a172a7cd7ea0b5daad8d14c8ba8deb8f7f89991a8ef10d7cc5bb5c2c7d5c4a13c1c395f5db306172506819e176aaf193d725f88fc6c035c12aad82b42d6fe528a6d39cedfb779108e4c491b8b3588f8421f9e3e82e01db40abdd7a56ee0a4d4cf88f0e409d144108cc4d4b58b2f55bd73d67c0d5f6ddbaa555515c6b31f7c287db24c5e6446d6647570a489f56eff50f656b5b927f9d1a6626d8ff4d5a8516c69f401eac05577b4e5587abd1d67e8ce86db02ac76cacc9cc4848ad844d444dc3fa48a971f90f7fb5962509834c5d00e735e57b9ce48c01b3b6a1d4d17d8ce63d0247f4837155e17885da6ce3a79da32e06f40b116cf74346ffd5cebfef007ce51520c354172301f8497d7157f44b82ae1a612e78af85b983a73501279294ccec21d275c4ad5153345f61b7edbe3a43365bb7d48fd14e8ed63f6b22ab5c02a1891033a4b817fc851f"}, &(0x7f00000001c0)=0x644) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={r4, @in={{0x2, 0x4e20, @multicast1}}, [0x2, 0x5, 0x0, 0x8, 0x1000, 0x6, 0x4, 0xa000, 0x2, 0x1, 0x7, 0x4, 0x600000, 0x5, 0x5e4]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000440)={r5, 0x8, 0xcb, "2c0bce7247de3306ef60e6447c153d0169dcec2966791aee093eb0f4c2c071ba2fd343600ee7ea3ac82ef4e4f4b752500d709abdac9b338febc837e6f6a29accf31018aedce00566295ee581feb75eed4c305aa2fbac5f5cf2768d7e90212a1a1366ad2edb0083ad01a9c97a701ce7ef867b93338566ee08af870c0723bf7d4983fc0cb6a5e1372c4740c00e24ad54dbdd32c478cbc85824fca48ba322728c9ed1ef371b34b92e731b1c978ca655cfb989212026f6497e5e1829377764de2d7006ef117189878b2877fb4c"}, 0xd3) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:30 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:47:30 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e00000000040000000400", 0x4f, 0x1400}], 0x0, 0x0) [ 373.895319] attempt to access beyond end of device [ 373.942875] loop2: rw=12288, want=8200, limit=20 17:47:30 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e00000000040000000400", 0x4f, 0x1400}], 0x0, 0x0) [ 373.968262] attempt to access beyond end of device 17:47:30 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 374.017230] loop2: rw=12288, want=12296, limit=20 17:47:30 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 374.061943] attempt to access beyond end of device [ 374.111681] loop2: rw=12288, want=8200, limit=20 [ 374.135288] attempt to access beyond end of device 17:47:30 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e00000000040000000400", 0x4f, 0x1400}], 0x0, 0x0) 17:47:30 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 374.163835] loop2: rw=12288, want=12296, limit=20 17:47:30 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="08000100706369001100020030303030b5000800f76f093e27c686b6abb8513a8c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:30 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:30 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000", 0x5c, 0x1400}], 0x0, 0x0) 17:47:30 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c000300000008000100706369001100020030313000"/68, @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 374.376807] attempt to access beyond end of device [ 374.400308] loop2: rw=12288, want=8200, limit=20 [ 374.412085] attempt to access beyond end of device [ 374.423756] loop2: rw=12288, want=12296, limit=20 [ 374.434967] attempt to access beyond end of device [ 374.456384] loop2: rw=12288, want=8200, limit=20 [ 374.468074] attempt to access beyond end of device [ 374.482291] loop2: rw=12288, want=12296, limit=20 [ 374.540487] print_req_error: I/O error, dev loop2, sector 16 17:47:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) sched_yield() r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:31 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000", 0x5c, 0x1400}], 0x0, 0x0) 17:47:31 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 17:47:31 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:31 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:31 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xcc) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, &(0x7f0000006ffc)=0x3, 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x28, 0x0, 0x9, 0x0, 0x1, 0xfffffffffffffffc}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000900)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="42f2756eee7e699ec6f9d0721fe63b1e89bf75c781d1f84cc99f648c70a497030000186983da77ac4b677020aff44992c97cdc8bc8d50900bf"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:31 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000", 0x5c, 0x1400}], 0x0, 0x0) 17:47:31 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 17:47:31 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:31 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:31 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0df023ef64ad16f4860f79d051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:31 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000", 0x63, 0x1400}], 0x0, 0x0) 17:47:31 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:31 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1400}], 0x0, 0x0) 17:47:31 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESHEX, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="0800010070636900300000000008008b1d1d081bdd6ee25700000000000000003a386e3abc8fdb21ab7584f9fa2e67e2322296dd43494f4e3ddcb86eb1b9be58510e513f1acaf0682a9712b4f3dbd778cbc0eb2e253c9436eb8723cb6d79824e893f9aed52c16d359f594624df9fdf3908b21b42236b71303cd359deb8305fe937a7618b48784042cf73d609f589b797648c38e8fc2c0cf7f697f1559c96cc59d64444d4167c47951dcdf80e33f8ca77e631f6d01b8d43466880e8c4097560774cc72e16", @ANYRES32, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711ce223419c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:31 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000", 0x63, 0x1400}], 0x0, 0x0) 17:47:31 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000a40)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="08000100703230303a30303a41e3c51425c5e6ac00008b00", @ANYRES32=r3, @ANYBLOB="af590a283f83382f496c6766e0dee77352b96f494fdeaa056d1d89e89848a6000b57cef55e443b2e1a7555ef2a4489ac201e8f4798841cf089551f85a3ae523ca4cb2950c4cae8593a7b8524d5b07845da8a99483bad769ea3fead7d5113f9e0c910ebb99e2d17d20ded887c0517fa470ae0b0c8fff745dc67188fc36ce9786ee08b7e4b9addc1"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x40, 0x4, 0x0, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x208080, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000380)=0x9, 0x4) close(0xffffffffffffffff) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="57d801000009000000414d8a95000000"], 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)={0x158, r4, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xf6a}]}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x789}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}]}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x39}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f5c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2e}]}]}, @TIPC_NLA_SOCK={0x4}]}, 0x158}, 0x1, 0x0, 0x0, 0x4008000}, 0x49005) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r5, 0xc004aea7, &(0x7f0000000180)=0x10001) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:31 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000", 0x63, 0x1400}], 0x0, 0x0) 17:47:31 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1400}], 0x0, 0x0) 17:47:31 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000a40)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="08000100703230303a30303a41e3c51425c5e6ac00008b00", @ANYRES32=r3, @ANYBLOB="af590a283f83382f496c6766e0dee77352b96f494fdeaa056d1d89e89848a6000b57cef55e443b2e1a7555ef2a4489ac201e8f4798841cf089551f85a3ae523ca4cb2950c4cae8593a7b8524d5b07845da8a99483bad769ea3fead7d5113f9e0c910ebb99e2d17d20ded887c0517fa470ae0b0c8fff745dc67188fc36ce9786ee08b7e4b9addc1"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:31 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:31 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000a40)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="08000100703230303a30303a41e3c51425c5e6ac00008b00", @ANYRES32=r3, @ANYBLOB="af590a283f83382f496c6766e0dee77352b96f494fdeaa056d1d89e89848a6000b57cef55e443b2e1a7555ef2a4489ac201e8f4798841cf089551f85a3ae523ca4cb2950c4cae8593a7b8524d5b07845da8a99483bad769ea3fead7d5113f9e0c910ebb99e2d17d20ded887c0517fa470ae0b0c8fff745dc67188fc36ce9786ee08b7e4b9addc1"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:31 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x1400}], 0x0, 0x0) 17:47:31 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100", 0x66, 0x1400}], 0x0, 0x0) 17:47:31 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 17:47:31 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x80, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x3, 0x10000048, 0x0, 0x2, 0x0, 0x1, 0x4, 0x3, 0x3}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESOCT=0x0, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:32 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040), 0x0, 0x1400}], 0x0, 0x0) 17:47:32 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 375.752402] print_req_error: I/O error, dev loop1, sector 16 17:47:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000140)=0x1f, 0x4) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000000a000/0x18000)=nil, 0x0, 0x0, 0xe, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:32 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100", 0x66, 0x1400}], 0x0, 0x0) 17:47:32 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESHEX, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="0800010070636900300000000008008b1d1d081bdd6ee25700000000000000003a386e3abc8fdb21ab7584f9fa2e67e2322296dd43494f4e3ddcb86eb1b9be58510e513f1acaf0682a9712b4f3dbd778cbc0eb2e253c9436eb8723cb6d79824e893f9aed52c16d359f594624df9fdf3908b21b42236b71303cd359deb8305fe937a7618b48784042cf73d609f589b797648c38e8fc2c0cf7f697f1559c96cc59d64444d4167c47951dcdf80e33f8ca77e631f6d01b8d43466880e8c4097560774cc72e16", @ANYRES32, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711ce223419c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:32 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e202284c06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a1316b1e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6b0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:32 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040), 0x0, 0x1400}], 0x0, 0x0) 17:47:32 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:47:32 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100", 0x66, 0x1400}], 0x0, 0x0) [ 376.048341] f2fs_msg: 466 callbacks suppressed [ 376.048352] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 376.102029] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 376.147430] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 376.164992] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 376.172755] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 376.172768] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 376.195271] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 376.205213] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 376.217778] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 376.225878] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 376.273389] ================================================================== [ 376.281204] BUG: KASAN: use-after-free in do_blk_trace_setup+0xa5b/0xad0 [ 376.288049] Read of size 8 at addr ffff88809063a880 by task syz-executor.5/17283 [ 376.295584] [ 376.297202] CPU: 0 PID: 17283 Comm: syz-executor.5 Not tainted 4.14.180-syzkaller #0 [ 376.305073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.314482] Call Trace: [ 376.317097] dump_stack+0x13e/0x194 [ 376.320737] ? do_blk_trace_setup+0xa5b/0xad0 [ 376.325250] print_address_description.cold+0x7c/0x1e2 [ 376.330759] ? do_blk_trace_setup+0xa5b/0xad0 [ 376.335244] kasan_report.cold+0xa9/0x2ae [ 376.339400] do_blk_trace_setup+0xa5b/0xad0 [ 376.343713] blk_trace_setup+0xa3/0x120 [ 376.347790] ? do_blk_trace_setup+0xad0/0xad0 [ 376.352318] ? retint_kernel+0x2d/0x2d [ 376.356301] ? sg_ioctl+0x243/0x2620 [ 376.361331] sg_ioctl+0x2f9/0x2620 [ 376.364868] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 376.369626] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 376.374204] ? retint_kernel+0x2d/0x2d [ 376.378117] ? do_vfs_ioctl+0xcc8/0xfe0 [ 376.382114] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 376.386685] do_vfs_ioctl+0x75a/0xfe0 [ 376.390720] ? selinux_file_mprotect+0x5c0/0x5c0 [ 376.395490] ? ioctl_preallocate+0x1a0/0x1a0 [ 376.399898] ? security_file_ioctl+0x76/0xb0 [ 376.404314] ? security_file_ioctl+0x83/0xb0 [ 376.409089] SyS_ioctl+0x7f/0xb0 [ 376.412442] ? do_vfs_ioctl+0xfe0/0xfe0 [ 376.416419] do_syscall_64+0x1d5/0x640 [ 376.420393] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.425573] RIP: 0033:0x45c829 [ 376.428755] RSP: 002b:00007f37df8cfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 376.436473] RAX: ffffffffffffffda RBX: 00000000004e1660 RCX: 000000000045c829 [ 376.443745] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000005 [ 376.451017] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 376.458322] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 376.465602] R13: 000000000000022a R14: 00000000004c4506 R15: 00007f37df8d06d4 [ 376.472890] [ 376.474503] Allocated by task 17283: [ 376.478203] save_stack+0x32/0xa0 [ 376.481652] kasan_kmalloc+0xbf/0xe0 [ 376.485366] kmem_cache_alloc_trace+0x14d/0x7b0 [ 376.490024] do_blk_trace_setup+0x11e/0xad0 [ 376.494528] blk_trace_setup+0xa3/0x120 [ 376.498497] sg_ioctl+0x2f9/0x2620 [ 376.502061] do_vfs_ioctl+0x75a/0xfe0 [ 376.505972] SyS_ioctl+0x7f/0xb0 [ 376.509422] do_syscall_64+0x1d5/0x640 [ 376.513300] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.518486] [ 376.520475] Freed by task 17303: [ 376.523827] save_stack+0x32/0xa0 [ 376.527262] kasan_slab_free+0x75/0xc0 [ 376.531150] kfree+0xcb/0x260 [ 376.534282] blk_trace_remove+0x52/0x80 [ 376.538315] sg_ioctl+0x22a/0x2620 [ 376.541865] do_vfs_ioctl+0x75a/0xfe0 [ 376.545650] SyS_ioctl+0x7f/0xb0 [ 376.549005] do_syscall_64+0x1d5/0x640 [ 376.552895] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.558077] [ 376.559694] The buggy address belongs to the object at ffff88809063a840 [ 376.559694] which belongs to the cache kmalloc-128 of size 128 [ 376.572435] The buggy address is located 64 bytes inside of [ 376.572435] 128-byte region [ffff88809063a840, ffff88809063a8c0) [ 376.584224] The buggy address belongs to the page: [ 376.589143] page:ffffea0002418e80 count:1 mapcount:0 mapping:ffff88809063a000 index:0xffff88809063a600 [ 376.598681] flags: 0xfffe0000000100(slab) [ 376.602821] raw: 00fffe0000000100 ffff88809063a000 ffff88809063a600 000000010000000a [ 376.610704] raw: ffffea00021c7460 ffffea0002556b60 ffff88812fe54640 0000000000000000 [ 376.618582] page dumped because: kasan: bad access detected [ 376.624277] [ 376.625886] Memory state around the buggy address: [ 376.630809] ffff88809063a780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 376.638173] ffff88809063a800: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 376.645520] >ffff88809063a880: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 376.652875] ^ [ 376.656240] ffff88809063a900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 376.663603] ffff88809063a980: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb 17:47:33 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040), 0x0, 0x1400}], 0x0, 0x0) 17:47:33 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0xfffffffe}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x36121}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0x42) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000fa0926c2f020435434936debf7f27cf156891deb49d9950d00000000000004bd3839a263350b31b65d4bb5baca6b0ddff051ebb53496f7e435685e2e20226cc06e2fb4ab556c872125db6d65cee5d8dec1b94c1a7370521daf9111c032570125bb7d0d38af7a131600e9bce7bf0f3e7aed97d10f4890525523fe89f98d6bd30fb259d07d94d32ccae5097cfa72956dae3bba0ca2755ea8d1a79a372d88c7270dc23f2807af483d61d1e4fa79cd807c440721ad501b25ae98786ab6d2c129b1c391a491232b7e2aca1a6f0dca4e9cd6e4d06149f7f5e2", @ANYRES16, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e3000000035e3227d93180008008c0003000000080001007063690011000200303130303a303000000000000000", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 17:47:33 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 376.670989] ================================================================== [ 376.678338] Disabling lock debugging due to kernel taint 17:47:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f00000000c0)="b9d20900000f320f79f426f32e67d14141360f01c8b9800000c00f3235000400000f300f060f01c80f06f3f30f015230c744240000800000c7442402df4c28bfc7442406000000000f011424", 0x4c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000140)={[0x1]}, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000240)="ba4300ecf32ef0f750b50f01c90f3066b9690200000f3266b99f0000400f3266654766b8004000000f23c80f21f866350800a0000f23f8b82b008ed80f01bd0050", 0x41}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) kcmp(r3, r4, 0x0, r1, r0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:47:33 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e0000001800000002", 0x35, 0x1400}], 0x0, 0x0) 17:47:33 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:47:33 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c0000000900000001000000020000000000000000300000000000000e0000001800000002", 0x35, 0x1400}], 0x0, 0x0) [ 376.922215] print_req_error: I/O error, dev loop4, sector 16 [ 377.024884] Kernel panic - not syncing: panic_on_warn set ... [ 377.024884] [ 377.032557] CPU: 0 PID: 17283 Comm: syz-executor.5 Tainted: G B 4.14.180-syzkaller #0 [ 377.041658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.051292] Call Trace: [ 377.053895] dump_stack+0x13e/0x194 [ 377.057640] panic+0x1f9/0x42d [ 377.060999] ? add_taint.cold+0x16/0x16 [ 377.065075] ? preempt_schedule_common+0x4a/0xc0 [ 377.069930] ? do_blk_trace_setup+0xa5b/0xad0 [ 377.074597] ? ___preempt_schedule+0x16/0x18 [ 377.079125] ? do_blk_trace_setup+0xa5b/0xad0 [ 377.083642] kasan_end_report+0x43/0x49 [ 377.087634] kasan_report.cold+0x12f/0x2ae [ 377.092406] do_blk_trace_setup+0xa5b/0xad0 [ 377.096923] blk_trace_setup+0xa3/0x120 [ 377.100921] ? do_blk_trace_setup+0xad0/0xad0 [ 377.105561] ? retint_kernel+0x2d/0x2d [ 377.109464] ? sg_ioctl+0x243/0x2620 [ 377.113188] sg_ioctl+0x2f9/0x2620 [ 377.116741] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 377.121534] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 377.126122] ? retint_kernel+0x2d/0x2d [ 377.130030] ? do_vfs_ioctl+0xcc8/0xfe0 [ 377.134011] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 377.138600] do_vfs_ioctl+0x75a/0xfe0 [ 377.142425] ? selinux_file_mprotect+0x5c0/0x5c0 [ 377.147188] ? ioctl_preallocate+0x1a0/0x1a0 [ 377.151607] ? security_file_ioctl+0x76/0xb0 [ 377.156022] ? security_file_ioctl+0x83/0xb0 [ 377.160445] SyS_ioctl+0x7f/0xb0 [ 377.163827] ? do_vfs_ioctl+0xfe0/0xfe0 [ 377.167815] do_syscall_64+0x1d5/0x640 [ 377.171721] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 377.176920] RIP: 0033:0x45c829 [ 377.180107] RSP: 002b:00007f37df8cfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 377.187818] RAX: ffffffffffffffda RBX: 00000000004e1660 RCX: 000000000045c829 [ 377.195091] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000005 [ 377.202362] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 377.209903] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 377.217301] R13: 000000000000022a R14: 00000000004c4506 R15: 00007f37df8d06d4 [ 377.226083] Kernel Offset: disabled [ 377.229707] Rebooting in 86400 seconds..