[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 64.970239][ T26] audit: type=1800 audit(1562631503.023:25): pid=8976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 65.016274][ T26] audit: type=1800 audit(1562631503.023:26): pid=8976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 65.060510][ T26] audit: type=1800 audit(1562631503.033:27): pid=8976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.107' (ECDSA) to the list of known hosts. 2019/07/09 00:18:30 fuzzer started 2019/07/09 00:18:33 dialing manager at 10.128.0.26:37959 2019/07/09 00:18:33 syscalls: 2465 2019/07/09 00:18:33 code coverage: enabled 2019/07/09 00:18:33 comparison tracing: enabled 2019/07/09 00:18:33 extra coverage: extra coverage is not supported by the kernel 2019/07/09 00:18:33 setuid sandbox: enabled 2019/07/09 00:18:33 namespace sandbox: enabled 2019/07/09 00:18:33 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/09 00:18:33 fault injection: enabled 2019/07/09 00:18:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/09 00:18:33 net packet injection: enabled 2019/07/09 00:18:33 net device setup: enabled 00:19:56 executing program 0: syzkaller login: [ 158.094497][ T9140] IPVS: ftp: loaded support on port[0] = 21 00:19:56 executing program 1: [ 158.249497][ T9140] chnl_net:caif_netlink_parms(): no params data found [ 158.342911][ T9140] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.357806][ T9140] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.370722][ T9140] device bridge_slave_0 entered promiscuous mode [ 158.390547][ T9143] IPVS: ftp: loaded support on port[0] = 21 [ 158.398582][ T9140] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.405755][ T9140] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.418760][ T9140] device bridge_slave_1 entered promiscuous mode [ 158.470823][ T9140] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 158.484459][ T9140] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:19:56 executing program 2: [ 158.523655][ T9140] team0: Port device team_slave_0 added [ 158.532327][ T9140] team0: Port device team_slave_1 added [ 158.609969][ T9140] device hsr_slave_0 entered promiscuous mode [ 158.666851][ T9140] device hsr_slave_1 entered promiscuous mode 00:19:56 executing program 3: [ 158.814969][ T9145] IPVS: ftp: loaded support on port[0] = 21 [ 158.922861][ T9140] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.930152][ T9140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.938266][ T9140] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.945361][ T9140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.961231][ T9143] chnl_net:caif_netlink_parms(): no params data found [ 159.004990][ T9148] IPVS: ftp: loaded support on port[0] = 21 [ 159.091157][ T9143] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.102396][ T9143] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.111061][ T9143] device bridge_slave_0 entered promiscuous mode 00:19:57 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000040)=0x9) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000080)={0x100, 0x0, 0x301f, 0x1df5, 0x43f, 0xb9a4, 0x7ff, 0x1}) fanotify_mark(r0, 0x8, 0x1000, r0, &(0x7f00000000c0)='./file0\x00') io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) r1 = getpid() fcntl$lock(r0, 0x25, &(0x7f0000000100)={0x2, 0x3, 0x101, 0x4, r1}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000140)={{0x1, 0xfffffffffffffffd}, 'port0\x00', 0xa, 0x400, 0x100000000, 0x401, 0xe48, 0x7ff, 0x7, 0x0, 0x7, 0x9}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000240)={r2, 0x1}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={0x0, 0x4}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000300)={r3, 0x9}, &(0x7f0000000340)=0x10) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000380)={@loopback, @empty}, &(0x7f00000003c0)=0xc) sendmsg$kcm(r0, &(0x7f0000001880)={&(0x7f0000000400)=@nfc={0x27, 0x1, 0x2, 0x1}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000480)="912dc2061b904978195302b171e21f09319e4f82ed4c7247a962ce82019a91cbadf5e0ce2b729186a8a7fbf6502cbc4a1826e80979e033c8d3f3f19d478873577c8c2256333a9a91f4d5e939dcc50a1327a63e3051b1753c76d4c9995d8aece91c6f31c62c0f356ec7885c9e78154ccc8c082dffe86020003a94b0699c5a6b70d711280af0b190f329a4fa8cccf6712b52f4b1dcc1d51d9b881923f1b1c3c558e650799e45d4eceb10b1ffdd0b897a31c41bd987c6168389479914bcf35f22ac78a203744b42a47f461d384e7b14c306c0b5fb6b424db851e3ab52d45aff33916b1c6852fa61fb21a394726d448348108a46594659c51a72", 0xf8}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="3ba19febd0c3c60a82b90705db31053a0e31ef83ad0c9a352609d155dce841c42d7583b723bcc44d9bcf3c2865f31ea0a92b849d4af4a2c4ace8a7202953a898457e592416c8ad49e7d65faa5f9f5acef3ae9dfc72a834bc678eb5880e19b1ebc4f4b72a843f852269ec478dcc265224a272ffd5c688833c37406256a7e28b005cd87d793544f07d3be2faa19a12665b266e031c643b128ef98f9310baa363ea7c63ee9ab7b9687f19aa807985e05e370e8274dd67376d0f95d4a420570e67387c5f19dda622ad9e54", 0xc9}, {&(0x7f0000001680)="f929bc7b1cc1a600d38f6b86901e8389db0f1554f3b39ff037a4eb24f2b9945f1bce34d86ea58851da80217b386de278b06daecf36b9ff80f8c38e50", 0x3c}, {&(0x7f00000016c0)="7ada0fccb194ef88a3c718b29271c443fe02719a882454c624fd2734cd9f7bc655cff35def804d8c51b8b593ebc4290afd3da8dcb73d36d8", 0x38}], 0x5, &(0x7f0000001780)=[{0x30, 0x7d1aa5799d726343, 0x9, "6cff51effd0b0724223bb68867fb7dafd0280bbacb67e7082af4"}, {0xa0, 0x88, 0x7c1, "faddd2ffe49980bac4a687d4f2e9008024247362f664eb19e2cd22df7c3cdf1cb1150f5d1361a44f9448c3286b97ebd00c615851a5367efb3db62c39a6726908b9dad5fbfb67f6e696483217c3fb04b7e82fcc435e16b2dc5eef85b9ce5e20144c4b0b0585933ecbb2c4668b618f278daa29068f38ca6d20aeaa1985a6c5c0e78286773dbbb5af96a94b126a"}], 0xd0}, 0x800) sendmsg$kcm(r0, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f00000018c0)="c5d2199474f0a07016e82faece6a963b4681db31b0821ec693fc858f5d0100a41293fafea9a8615c70dd6caf60116a968d7a2c7b06c9b1a53f8e75d8d1e3290701767818d0e9a0ba6da1c763b957cf15b6088ec12b2717e78ea209af9e54d51854018df1da7fd0b0bc94ac8e7d3b5b97a86428ca19fb65d8b72163f02a241ee68bc42c0dcb948b4a0d845f612747f544ea29038875", 0x95}, {&(0x7f0000001980)="bc734342e6c09a14cca7389a16e15fbfe76abf316d57bde6f78c72a62163c822ba1a88094807de4c7f40ee299122ea41a2b238366dffee124e9e502e45aca098f999f220c883f09ca2b68739bc1649db2d579d1199b43d5f2d40002d06f1c29b14e7a42cbfefd11272d71bf6fe693da3116fd29447ab2cc3426327ed2bb1eac92c9104f154ce3e25a7cd11f9b43a5d2edce8f0392f4e38a58f3785b39308c32f90484c1137b1eceab709b3995d7f791e530fc5", 0xb3}, {&(0x7f0000001a40)="dced95511e1e504bc3af861e36b7ec5d1fe7c848795204292a888117c75e75c252fd4d22a009b7304fc40eac15f91acff3112a942951d417380db56e5e9ac9ddcc8a318093a671d0af64d5cf9fcc607837f3", 0x52}], 0x3, &(0x7f0000001b00)=[{0x108, 0xff, 0x2, "7a667bb3b0628ede5c303e00644369493bd573f16944a506fc48dc7fc010de3af1decca464628c8887d55b857f5a15e93bcd2e00b3608c590e44e88de2b549341adc6dae17e08b624dc8d76b0ec94a4026a667e71ad6290259b882ab2fd64382ebd5c95b06e7395d80f07f6f5e584d150a4cd88fae33f3b0442895df566a7db55e65b352f61788ed04ca4f8a9209bed513f88c12befdf14ebe72c53a935e7b12b6b470da63fc80f229b075883c93b579e8a1c0aee6920ff0bcda98b6cd042182986569a37a2ad523efbe8507a624607666659047204ab1188dbfa17a5b750b8465818c570f301b86bc779c2a46307ef2e4cd"}], 0x108}, 0x800) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000001cc0)={0x0, &(0x7f0000001c80)}, 0x10) openat$cuse(0xffffffffffffff9c, &(0x7f0000001d00)='/dev/cuse\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) write$sndseq(r0, &(0x7f0000001d80)=[{0x0, 0x3f, 0xb1, 0x6, @tick=0x5, {0xea13, 0x3093858c}, {0x100, 0x11}, @raw32={[0x5, 0x1f]}}, {0x7, 0x100000000, 0x3, 0xa6, @time={0x77359400}, {0x7fff}, {0x9, 0x800}, @raw8={"e093493ec187001fee6e5200"}}, {0x1, 0xa3, 0x6, 0x12, @time={r4, r5+30000000}, {0x8, 0x80000001}, {0x5, 0x200}, @addr={0x8c6, 0x775}}, {0x9, 0x8, 0x0, 0xa94, @time={0x0, 0x989680}, {0x5, 0x6a}, {0x8, 0x81}, @note={0x200, 0x54, 0x100, 0x5, 0x7fff}}, {0x6, 0x200, 0x7, 0x8, @time={0x0, 0x989680}, {0x1ef8, 0x2}, {0x1, 0x1000}, @queue={0x80000000, {0x10001, 0x8}}}, {0x1, 0x6, 0x7, 0x8, @time={0x0, 0x1c9c380}, {0x3}, {0x0, 0x81}, @raw32={[0x4, 0x0, 0xfffffffffffffff7]}}], 0x120) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000001ec0)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/mixer\x00', 0x0, 0x0) r7 = socket$l2tp(0x18, 0x1, 0x1) symlinkat(&(0x7f0000001f40)='./file0\x00', r6, &(0x7f0000001f80)='./file0\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000002000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001fc0)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000002040)={0x14, 0x88, 0xfa00, {r8, 0x30, 0x0, @in6={0xa, 0x4e20, 0x40, @mcast1, 0x6}}}, 0x90) sendmsg$kcm(r6, &(0x7f0000002800)={&(0x7f0000002100)=@pppol2tpv3in6={0x18, 0x1, {0x0, r7, 0x3, 0x1, 0x1, 0x2, {0xa, 0x4e23, 0x7fffffff, @remote, 0x4}}}, 0x80, &(0x7f0000002780)=[{&(0x7f0000002180)="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", 0xfd}, {&(0x7f0000002280)="53f4449dbb66761718887bb30a26eda7c67e4882f79cfebf9ab708ed8f04fd6e8f8560208bfc19c48a4a1e64b91db1badf9c7b195b39fdba2e6e29cea2b1b87d225cb8d757b40c6c1b3b4852162749d934e5abb8a59d894e3ad6e98ec464d345e3301d020416bc699dd827a379608b026dcf6efa1d96e763123f7432cd2f127296e9d1d395edf0d493c6b5eecb3fb4b2c2194c0e2856b172de0d018bb01afdb8c9c3", 0xa2}, {&(0x7f0000002340)="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", 0xfa}, {&(0x7f0000002440)="4240337d0b403c93d3e645b1a4e1806e5951a28a9b30f3c741d1efab50d9778d3a28ee60be73001cc7682474f3a4ad360dd5ab4cd297cdd7356a79ae6192f65a036b902dd5122cfbc6a320392ac85d9e76e647d5bae53df4262c787e3e43e04fb5e30b5860a77e1ad8f1736dcf323afe26b79c61437f849afc275acbe7f4bd7ef349324638b4814019f67cb032120b5070eb074948d23214e7a6e7720b948e13d0905136d276109e120fe9436e578bb4dbd02a02d5f2d481043a7343a7663456c82f743d248cfde127721b0e46ec5dbce613d27a", 0xd4}, {&(0x7f0000002540)="aad3dc9b532c532562aae4824bff14f323a90d0a15e60c683e70634430b80e1a053badcb2a64873b49cc7fa6c8a64a2f9d366cb18347085b088ce7debdcb45172522984b19f688129e705d675ef439081b6bba317aaebda9e68858bed5c4d1b3744e959736e68a8e7e09a2c29b21655d82c501a92d6024ac43682bc242a0b31f2e8776be1ef1f38c54877124db5ccef873f303165993ef7ad28c496a45aaa57f523c766e638c68e4224c3311002cfce94a6f72e1e497c5c9cb06d052f3293cd462bd38e1cc65d566e5d062cf24a44665335a844d0b7799518c", 0xd9}, {&(0x7f0000002640)="064eaf52224bb5a9d35c68de556bfa9cea97d49b30d598b79eb0852a8874aa06737730b41ec8d61c6902a08bb47096643682e79033026aed99023ae9875502581bf57816122c2e96c7d9f4af7a027a859450c32cb744ffb2de6976b2af57938b193e", 0x62}, {&(0x7f00000026c0)="93570bd662bb6b763f080fc2df6c2b65bc78550eb9f9126b24a398f007f97f5c08cee65e457014b0f1ba569f81a03fbe8ec07cfc15777fb570c6dcf18f7649b40b006f7da3bef8ee839ca9cd83dc47f314cd2762ff7261e5a52afcc00b50953944e2ae66320b7db5fa7baa29b9aac247bb61eb62083a9ff1f7f77fe397f9d31eb4e92043778d1fcc3797fd270656379a06de710b95c3", 0x96}], 0x7}, 0x1) ioctl$VIDIOC_TRY_DECODER_CMD(r6, 0xc0485661, &(0x7f0000002840)={0x4, 0x1, @stop_pts=0x13ffa000000}) write$P9_RXATTRWALK(r0, &(0x7f00000028c0)={0xf, 0x1f, 0x1, 0x1}, 0xf) ioctl$KVM_GET_DIRTY_LOG(r7, 0x4010ae42, &(0x7f0000002900)={0x10004, 0x0, &(0x7f0000ffc000/0x2000)=nil}) syz_open_dev$dri(&(0x7f0000002940)='/dev/dri/card#\x00', 0x6, 0x100c0) [ 159.160041][ T9143] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.167761][ T9143] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.195580][ T9143] device bridge_slave_1 entered promiscuous mode [ 159.252150][ T9140] 8021q: adding VLAN 0 to HW filter on device bond0 [ 159.308306][ T3506] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.328032][ T3506] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.350211][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 159.396140][ T9143] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.427447][ T9143] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:19:57 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2004008}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xd4, r1, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbb}]}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb499}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffff113}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xff}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4338ef0f}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000280)={0x3, &(0x7f0000000240)=[{0x1, 0x20000000000}, {0x7, 0x2}, {0x6, 0x5f}]}) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000002c0)=""/210) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000003c0)=0x0) timer_create(0x1, &(0x7f0000000400)={0x0, 0x2a, 0x0, @tid=r2}, &(0x7f0000000440)) mq_timedsend(r0, &(0x7f0000000480)="12e9301921e1a6d2579b7079104ed422b528e385ce989a18a3baca27096c9d899ee79b3e73e446f0aa53c800803c801b661d9055c249cac98bf77c860e9032a9a0d2e76b78108b", 0x47, 0x3, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) getpeername$inet(r3, &(0x7f0000000500), &(0x7f0000000540)=0x10) setsockopt$inet6_buf(r0, 0x29, 0xfd, &(0x7f0000000580)="1c04cb7d30dad8cb071bef1752582100a29a729621f5a3a3a99d166bedbaa20b24aa455ada96b091499ca7a58cb1b90b2c70182ada780b00b4c241b369d2a4737489f72fba5ecc583b9a62626e7c73e82a8d2ef5843031513c5faa265b9ecdfd7bbc0373175a9902f86bb4840215f7b2f20f9e387810c57041ecac80ac4451252d5e656f96c590e5ff1f5154c3de441af4", 0x91) getpeername$llc(r0, &(0x7f0000000640)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000680)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_id=0x0, &(0x7f0000000700)=0x4) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000740)={r4, 0x2}, 0x8) syslog(0xa, &(0x7f0000000780)=""/169, 0xa9) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000840)={0x33, @remote, 0x4e23, 0x1, 'nq\x00', 0x4, 0x6, 0x15}, 0x2c) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000880)={0x0, @motion_det}) bind$inet6(r0, &(0x7f0000000940)={0xa, 0x4e21, 0x7, @empty}, 0x1c) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000980)=0x130802, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000009c0)=0x601, 0x4) futex(&(0x7f0000000a00)=0x1, 0x81, 0x0, &(0x7f0000000a40)={0x0, 0x1c9c380}, &(0x7f0000000a80)=0x1, 0x2) syz_open_dev$amidi(&(0x7f0000000ac0)='/dev/amidi#\x00', 0x1, 0x24000) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000b00)) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000b80)={'filter\x00', 0x7, 0x4, 0x480, 0x140, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000b40), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@local, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x2, 0xffffffff}}}, {{@arp={@multicast1, @local, 0xffffff00, 0xff, @mac=@link_local, {[0xff, 0x0, 0xff, 0xff, 0xff, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0x0, 0xff]}, 0x2e, 0x5, 0x0, 0xffffffffffff0001, 0x2, 0x7, 'nr0\x00', 'bridge0\x00', {0xff}, {}, 0x0, 0x108}, 0xf0, 0x118}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x27}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) r5 = socket(0x0, 0x4, 0x4) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000001080)={r4, 0x7fffffff}, 0x8) syz_open_dev$sndpcmp(&(0x7f00000010c0)='/dev/snd/pcmC#D#p\x00', 0xfff, 0x0) ioctl$TIOCNXCL(r0, 0x540d) [ 159.556031][ T9143] team0: Port device team_slave_0 added [ 159.570528][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 159.579503][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 159.593783][ T9140] 8021q: adding VLAN 0 to HW filter on device team0 [ 159.618956][ T9152] IPVS: ftp: loaded support on port[0] = 21 [ 159.639493][ T9143] team0: Port device team_slave_1 added [ 159.669322][ T9148] chnl_net:caif_netlink_parms(): no params data found [ 159.690528][ T9145] chnl_net:caif_netlink_parms(): no params data found [ 159.702070][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 159.713552][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 159.723234][ T9149] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.730479][ T9149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.764162][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 159.779950][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 159.788929][ T3506] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.795980][ T3506] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.860025][ T9143] device hsr_slave_0 entered promiscuous mode [ 159.899921][ T9143] device hsr_slave_1 entered promiscuous mode [ 159.956834][ T9143] debugfs: File 'hsr0' already present! [ 159.996916][ T9156] IPVS: ftp: loaded support on port[0] = 21 [ 160.014871][ T9148] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.023449][ T9148] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.031490][ T9148] device bridge_slave_0 entered promiscuous mode [ 160.040450][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 160.070079][ T9148] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.077639][ T9148] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.085482][ T9148] device bridge_slave_1 entered promiscuous mode [ 160.137743][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 160.146849][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 160.155317][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 160.164032][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.172939][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.181551][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 160.190089][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 160.200156][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 160.222033][ T9148] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 160.235294][ T9148] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 160.254986][ T9145] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.262342][ T9145] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.273598][ T9145] device bridge_slave_0 entered promiscuous mode [ 160.283755][ T9145] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.291695][ T9145] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.299533][ T9145] device bridge_slave_1 entered promiscuous mode [ 160.340032][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 160.349452][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 160.360296][ T9148] team0: Port device team_slave_0 added [ 160.374950][ T9140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 160.395640][ T9148] team0: Port device team_slave_1 added [ 160.414315][ T9145] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 160.428221][ T9145] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 160.488016][ T9145] team0: Port device team_slave_0 added [ 160.495747][ T9145] team0: Port device team_slave_1 added [ 160.523298][ T9152] chnl_net:caif_netlink_parms(): no params data found [ 160.579696][ T9148] device hsr_slave_0 entered promiscuous mode [ 160.616793][ T9148] device hsr_slave_1 entered promiscuous mode [ 160.656476][ T9148] debugfs: File 'hsr0' already present! [ 160.799748][ T9145] device hsr_slave_0 entered promiscuous mode [ 160.858289][ T9145] device hsr_slave_1 entered promiscuous mode [ 160.896633][ T9145] debugfs: File 'hsr0' already present! [ 160.902532][ T9152] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.909720][ T9152] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.920473][ T9152] device bridge_slave_0 entered promiscuous mode [ 160.928411][ T9152] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.935513][ T9152] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.943716][ T9152] device bridge_slave_1 entered promiscuous mode [ 160.969600][ T9140] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 160.997520][ T9156] chnl_net:caif_netlink_parms(): no params data found [ 161.028504][ T9152] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.054190][ T9143] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.084138][ T9152] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.122170][ T9152] team0: Port device team_slave_0 added [ 161.148777][ T9152] team0: Port device team_slave_1 added [ 161.170466][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.184849][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.198135][ T9143] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.217194][ T9156] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.224367][ T9156] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.232948][ T9156] device bridge_slave_0 entered promiscuous mode [ 161.240837][ T9156] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.249257][ T9156] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.257438][ T9156] device bridge_slave_1 entered promiscuous mode 00:19:59 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) [ 161.325456][ T9156] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.347537][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.361628][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.387512][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.394624][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.416716][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.439454][ T9169] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 161.445090][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.458620][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.465716][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.474036][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.491738][ T9169] EXT4-fs (sda1): re-mounted. Opts: data=journal, [ 161.549680][ T9152] device hsr_slave_0 entered promiscuous mode [ 161.562467][ T9173] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 161.575199][ T9173] EXT4-fs (sda1): re-mounted. Opts: data=journal, [ 161.597194][ T9152] device hsr_slave_1 entered promiscuous mode [ 161.616600][ T9152] debugfs: File 'hsr0' already present! 00:19:59 executing program 0: [ 161.655461][ T9156] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.694853][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 00:19:59 executing program 0: [ 161.714172][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.738297][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.757749][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 00:19:59 executing program 0: [ 161.788314][ T9156] team0: Port device team_slave_0 added [ 161.797052][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.812063][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.823456][ T3506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 00:19:59 executing program 0: [ 161.844836][ T9148] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.863143][ T9143] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 161.880891][ T9143] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 00:20:00 executing program 0: [ 161.929386][ T9156] team0: Port device team_slave_1 added [ 161.953478][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.962557][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.972423][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.981182][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.991855][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 00:20:00 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) [ 162.051599][ T9148] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.103622][ T9143] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.130011][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.144633][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.238677][ T9156] device hsr_slave_0 entered promiscuous mode [ 162.256810][ T9156] device hsr_slave_1 entered promiscuous mode [ 162.296849][ T9156] debugfs: File 'hsr0' already present! [ 162.324484][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.337367][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.345822][ T9149] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.352987][ T9149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.361460][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.401378][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.411460][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.423201][ T3005] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.430336][ T3005] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.439019][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.448024][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.461552][ T9145] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.479320][ T9145] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.494179][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.504958][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.513285][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.524783][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.541152][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.548297][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state 00:20:00 executing program 1: [ 162.571680][ T9152] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.606469][ T9157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.614588][ T9157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.625609][ T9157] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.634416][ T9157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.643971][ T9157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.656823][ T9157] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.663902][ T9157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.671897][ T9157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.681761][ T9157] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.707420][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.721183][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.730175][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.739460][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.748607][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.765680][ T9152] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.797168][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.805035][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.814561][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.822883][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.831516][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.840300][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.849223][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.858254][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.866797][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.875111][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.884150][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.908787][ T9156] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.918819][ T9145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.935903][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.945341][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.954140][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.961270][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.969862][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.978371][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.986783][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.995325][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.003860][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.010972][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.019244][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.028644][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.047868][ T9156] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.067068][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.074877][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.086586][ T9148] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.112507][ T9145] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.121229][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.134416][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.143734][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.152671][ T3005] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.159823][ T3005] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.169284][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.178271][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.187105][ T3005] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.194171][ T3005] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.202445][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.212047][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.252607][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.269272][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.278478][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.287301][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.295694][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.305010][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.313872][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.322562][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.331139][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.340780][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.350155][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.380596][ T9148] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.389320][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.399635][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.408644][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.422137][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.431346][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.439995][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.448512][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.457086][ T9149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.467121][ T9152] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.484602][ T9156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.535243][ T9152] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.568167][ T9156] 8021q: adding VLAN 0 to HW filter on device batadv0 00:20:01 executing program 2: 00:20:01 executing program 3: 00:20:02 executing program 4: [ 163.997747][ T9232] IPVS: set_ctl: invalid protocol: 51 172.20.20.187:20003 [ 164.029176][ T9235] IPVS: set_ctl: invalid protocol: 51 172.20.20.187:20003 00:20:02 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:02 executing program 0: 00:20:02 executing program 1: 00:20:02 executing program 3: 00:20:02 executing program 2: 00:20:02 executing program 4: ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)="d353ff072d68b2e4dc14ec0e4e7efc1887") 00:20:02 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000300), 0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={'crc32-generic\x00'}}) 00:20:02 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:02 executing program 3: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 00:20:02 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2004008}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xd4, r1, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbb}]}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb499}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffff113}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xff}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4338ef0f}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000280)={0x3, &(0x7f0000000240)=[{0x1, 0x20000000000}, {0x7, 0x2}, {0x6, 0x5f}]}) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000002c0)=""/210) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000003c0)=0x0) timer_create(0x1, &(0x7f0000000400)={0x0, 0x2a, 0x0, @tid=r2}, &(0x7f0000000440)) mq_timedsend(r0, &(0x7f0000000480)="12e9301921e1a6d2579b7079104ed422b528e385ce989a18a3baca27096c9d899ee79b3e73e446f0aa53c800803c801b661d9055c249cac98bf77c860e9032a9a0d2e76b78108b", 0x47, 0x3, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) getpeername$inet(r3, &(0x7f0000000500), &(0x7f0000000540)=0x10) setsockopt$inet6_buf(r0, 0x29, 0xfd, &(0x7f0000000580)="1c04cb7d30dad8cb071bef1752582100a29a729621f5a3a3a99d166bedbaa20b24aa455ada96b091499ca7a58cb1b90b2c70182ada780b00b4c241b369d2a4737489f72fba5ecc583b9a62626e7c73e82a8d2ef5843031513c5faa265b9ecdfd7bbc0373175a9902f86bb4840215f7b2f20f9e387810c57041ecac80ac4451252d5e656f96c590e5ff1f5154c3de441af4", 0x91) getpeername$llc(r0, &(0x7f0000000640)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000680)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000006c0)=@assoc_id=0x0, &(0x7f0000000700)=0x4) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000740)={r4, 0x2}, 0x8) syslog(0xa, &(0x7f0000000780)=""/169, 0xa9) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000840)={0x33, @remote, 0x4e23, 0x1, 'nq\x00', 0x4, 0x6, 0x15}, 0x2c) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000880)={0x0, @motion_det}) bind$inet6(r0, &(0x7f0000000940)={0xa, 0x4e21, 0x7, @empty}, 0x1c) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000980)=0x130802, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000009c0)=0x601, 0x4) futex(&(0x7f0000000a00)=0x1, 0x81, 0x0, &(0x7f0000000a40)={0x0, 0x1c9c380}, &(0x7f0000000a80)=0x1, 0x2) syz_open_dev$amidi(&(0x7f0000000ac0)='/dev/amidi#\x00', 0x1, 0x24000) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000b00)) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000b80)={'filter\x00', 0x7, 0x4, 0x480, 0x140, 0x140, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000b40), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@local, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x2, 0xffffffff}}}, {{@arp={@multicast1, @local, 0xffffff00, 0xff, @mac=@link_local, {[0xff, 0x0, 0xff, 0xff, 0xff, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0x0, 0xff]}, 0x2e, 0x5, 0x0, 0xffffffffffff0001, 0x2, 0x7, 'nr0\x00', 'bridge0\x00', {0xff}, {}, 0x0, 0x108}, 0xf0, 0x118}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x27}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) r5 = socket(0x0, 0x4, 0x4) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000001080)={r4, 0x7fffffff}, 0x8) syz_open_dev$sndpcmp(&(0x7f00000010c0)='/dev/snd/pcmC#D#p\x00', 0xfff, 0x0) ioctl$TIOCNXCL(r0, 0x540d) [ 164.187804][ C1] hrtimer: interrupt took 31249 ns [ 164.197455][ T9247] jfs: Unrecognized mount option "defcontext=staff_u" or missing value [ 164.365985][ T9257] EXT4-fs (sda1): Cannot specify journal on remount [ 164.379959][ T9247] jfs: Unrecognized mount option "defcontext=staff_u" or missing value [ 164.409947][ T9254] IPVS: set_ctl: invalid protocol: 51 172.20.20.187:20003 00:20:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) openat$cgroup_int(r2, &(0x7f0000000040)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 00:20:02 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x3c) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000000)={0x3, @null}) socketpair(0x3, 0x80005, 0x80000001, &(0x7f0000000080)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='dummy0\x00', 0x10) 00:20:02 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:02 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x7) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000140)) lseek(r0, 0x0, 0x3) write$capi20(r1, &(0x7f0000000100)={0x10, 0x800, 0x82, 0x83, 0x798000000000, 0x9}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000040)={0x80000000, 0x9, 0xe, 'queue1\x00', 0x8}) 00:20:02 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000040), 0x4) setsockopt(r0, 0x3, 0x1, &(0x7f0000000140)="a53beee608af6652c3bf77528a1182f641b816fe4158cc8261de5cbd50a7ef9805fa1c286913e3cd6badaf851435eb0fae9ca67a6c5aebe08450c14b34168f833cbf148021bd83b785ffc785d5625a74139a02698c5fe61eea1211d2430c88f0f9136b00f4765d5c24dbf1060db9506efa6d1f10dd5297d2ec96b8a994ba93a049f57c991f5e16816723d088f8fad99ddb2684bf10c4fd63ff2117fa4ff0f3945801552f8f762b967bc92a7650d9d40a", 0xb0) 00:20:02 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) [ 164.719916][ T9287] jfs: Unrecognized mount option "defcontext=staff_u" or missing value 00:20:02 executing program 3: socketpair(0x0, 0x6, 0x200, &(0x7f0000000040)) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x1) 00:20:02 executing program 0: syz_open_dev$vivid(0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = getpgid(0xffffffffffffffff) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x3, r1}) clock_gettime(0x0, &(0x7f0000000900)) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {0x0}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) [ 164.860867][ T9299] EXT4-fs (sda1): Cannot specify journal on remount 00:20:03 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:03 executing program 1: r0 = socket$inet6(0xa, 0x7, 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x21}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6=@empty}}, 0xe8) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000480}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, r2, 0x204, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x91, 0xfffffffffffffe00, 0x101, 0x8]}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="637ac6a38fbaaf83dc3529f3c8f71add"}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x375b362f}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x800, 0xd75a, 0x8, 0x1]}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x482}]}, 0x80}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) connect$inet6(r0, &(0x7f0000000000), 0x1c) [ 165.224728][ T9324] jfs: Unrecognized mount option "defcontext=staff_u" or missing value 00:20:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x20000) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000080)="bcb2d15526e6d1871c13e4cf61ba796f434271e86d750e15a0fe5dcefb7b1df949e0056b84b3107f7ff23472d3d17e4e66f8ececa003e070ed6de1a5ec7d1896f5989610c5b734e41fc8722051520bda26dcef44a2d1986627ba53a6be3ca9ac0bac55d6288ebe9a6fd9d56c316182a1cd9abafd306a5768c5d0077e6297a93609c277516bc5fa6b") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c0000001000010600"/20, @ANYRES32=0x0, @ANYBLOB="00000000001000001c0012000c000100626f6e64000000000c0002000800180000000000"], 0x3c}}, 0x0) 00:20:03 executing program 4: fremovexattr(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x6) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000600)=ANY=[], 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100), 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000000)={0x80, 0x0, 0x8, 0x1000, 0xffffffffffff7fff, 0xfffffffffffffff8}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000500)=@sack_info={0x0, 0x8}, 0x0) msgrcv(0x0, &(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x3800) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000002c0)={0x0, 'sit0\x00'}, 0x18) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000000c0)=0x100) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000001340)=ANY=[]) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r3 = syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') sendfile(r2, r3, 0x0, 0x1) 00:20:03 executing program 0: syz_open_dev$vivid(0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = getpgid(0xffffffffffffffff) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x3, r1}) clock_gettime(0x0, &(0x7f0000000900)) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {0x0}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 00:20:03 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) [ 165.405783][ T9338] netlink: 'syz-executor.3': attribute type 24 has an invalid length. [ 165.443798][ T9338] (unnamed net_device) (uninitialized): option ad_actor_sys_prio: mode dependency failed, not supported in mode balance-rr(0) [ 165.460021][ T9336] EXT4-fs (sda1): Cannot specify journal on remount 00:20:03 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:03 executing program 4: syz_open_dev$vivid(0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = getpgid(0xffffffffffffffff) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x3, r1}) clock_gettime(0x0, &(0x7f0000000900)) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {0x0}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 00:20:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgrp(0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") sendmsg(r0, &(0x7f0000000540)={&(0x7f0000000100)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000180)="a35909aa93350b55bf77ddfa50b6156d98f5a06f47d8f4d2a3342b25584f34a5632e6710afc2d89355da3d5ef0d5828a56444d398db6cd2ea74305f17739ae77131ba452", 0x44}, {&(0x7f0000000200)="7d4917a8188406cc6a94b594d87fe5331af3804aa1877483c4063b8a5f10481dd8e520ee5a9f303cd5a07873cd46e759a38170afbd9b60201f05dc27f7f780e42775c436095f517d271086bb7de620f8efec197f9347c561eba362888aa80175153311154f6347eb165f714aac29a1d5941fe691092a32d328ed4e0cdfb589f8d9bcc53397bfc7fe9b5bd71f61f1823861b74c8af269c0f336470b3672799c9940dbe6d0aec11bbd20b9", 0xaa}, {&(0x7f00000002c0)="7a22d856cbdd4e85a8424f00287be0f7ed751abb2a18566e2f7bccc5f5a317c93b85d96d522327e120e2db974b9c7dddeb8e375faaae04ddb34d1e4f00162c64ecb3db12b3a72fe4fec4533a9562345327998aef26dbdcaf55ecdf97b18dffe005755211a65b26ea82d5b293a8c2fbae5e", 0x71}, {&(0x7f0000000340)="eb48a631730e9096a9d59c44d9808c6049ce8e6468b5d13b326f73efeb403139a8edf563cd1ae0135378aff87645e6dc1462653ae9cf3eea09b67339957d169186fcde36c82ce52a5dc4b3db968327520577b3e7e8c96fa56a062f8756d5ac82e9f60e1fc7c5a2acfe597f6e6257569293b9f59eef288ccfa2da3ab70a278cfad908b74fecd5780a99ae45b0c1c24c7480a84b8885fd6c0855f5a798553d2d9841faa96b7e470f8371fc92ad56e68150a003276e3e3929948cc96819d7b2d116b331f2b4c906d90784a5b7fa86589bd210b949194a7760e0be1427b0cd6cac65f8926b1dc3fd", 0xe6}, {&(0x7f0000000440)="6c1561d032113fd7ece38eb7673182f0bb37931611ca1189845676a098434a884832438753da461a176eff81a7b4f4c410e54c07b113e23b862c7e39ea3f287f7fa801a5b86fd97caede6d9d7b91f32ef7cbb4c920c32ff4bd7aea40b639d39f9d8ef21ec9970912d19e66aa4cf1eb65e723c424b45b0d72f4d252", 0x7b}], 0x5}, 0x4004) ptrace$setregset(0x4205, r1, 0x202, &(0x7f0000000000)={&(0x7f0000000080)="343c3655e4c30bc0eb2fcc1df99ecc3471d416cc5ff90c36e5d80f17d009adc8c6d3c5010d764c3d46dece8de7e6f72cec5a1b7da86d0c9bb10e9b146dc313c16e1311846980f98ae6df", 0x4a}) ioprio_get$pid(0x2, r1) 00:20:03 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:03 executing program 1: r0 = syz_open_dev$usb(0x0, 0x80000000006, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) ioctl$KDDISABIO(r0, 0x4b37) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) r1 = timerfd_create(0x0, 0x0) readv(r1, 0x0, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000006, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00008df000/0x6000)=nil, 0x6000, 0x0, 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000008b08b733b87107a144a16e21d679d22cb450960ff7aa6e041a7700fdff86000009f0d5363594f09f8bef41e088d9b90300000000000000cad550fe20353fda841f9d63a232b9b2500fb1d96033ccfdff066428eb4cb7860cfd"], 0x5e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) write$sndseq(r2, &(0x7f0000000080)=[{0x4b2, 0x9e4, 0x100000000, 0x2, @time={0x0, 0x1c9c380}, {0xb5, 0x3b}, {0x8, 0x9}, @connect={{0x2, 0x4}, {0x3, 0x5}}}], 0x30) 00:20:03 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0xfffffffffffffeeb, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0xffffffffffffffff}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r1, 0x1b}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setxattr$security_capability(0x0, &(0x7f0000000280)='security.capability\x00', &(0x7f00000002c0)=@v2={0x2000000, [{0x0, 0x100}, {0x0, 0x10000}]}, 0x14, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r3, &(0x7f0000001880)="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", 0x479, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) setsockopt$sock_void(r3, 0x1, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) statx(r0, &(0x7f0000000000)='./file0\x00', 0x7000, 0x4, &(0x7f0000000300)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) [ 165.830946][ T9361] jfs: Unrecognized mount option "defcontext=staff_u" or missing value [ 165.906194][ T9370] EXT4-fs (sda1): Cannot specify journal on remount 00:20:04 executing program 3: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x9, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x100000001) getsockopt(r0, 0x40000000000000ff, 0x1, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8000, 0x2000) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xe44, 0x12, 0x1}) 00:20:04 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x2000000000000000, 0x0) r0 = shmget(0x0, 0x2000, 0x10, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) r1 = syz_open_dev$loop(0x0, 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000000)='\\eth0mime_type$%\x00', 0x0) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) lsetxattr$trusted_overlay_nlink(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000102000007) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000180)=""/184, 0xb8}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffca88}, 0x80, 0x0}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x1) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f00000006c0)={"e372384d625981e91ed26b24d1a8d015b5293b4228db1a164f67f3cd60d4e9349d808b2834c90b643e0bc80bbe7ea1da14f3d2e6cbe0adccaec1cae16bbed9d841646ccc2999a00d3ea6e6851ec3a39933b56c59868c058d1042b1c0535fbeeb775f4600166e75a6e75a82bfa19607bc2ef71d2d889f6a26e2ef80fc34abba767d0299793469a0e5a27511c05000c166c3a4e0ebf9e26f915909aaad95d4a83613ab3922be9173564f71901c9415d5261c9ea17a52b3fcb2b6e2e69a4df3bd5771e1b31b40809008843f5a756c65f4f45e1c8610f1b4a8761ee21f89533baf5e12cde42fd84b67cb7a9a60e66deb642ba99b6f1c6888a78edf6c935ffc2cefc4a42515e31fe806552a15cdf8cfa06d0ebeaaede21dbf98697ab32f677383242d595f782bad0ef4dcbffd206472cbcb97ea0ae4b37edac315dacfa95df23131c28f24a388d5a2b29a674ec50ff11ed75d38ce274ac2b60aa90f7fccab075b46589305e8b7ec9ed01eaea540f260590b80dd2ba7d7e56fc007d7b37dee286470929d9fb235c0102ca4bccd9e7b5f65a9be6d718ec505a2a22400b438435d43c2075f96ec996eeef7f51e4a29f74e74ef483b95262d01913cd9b44c2dce04e02213814a0d67ce64058c660183d51a9557f2ee5235bd39e0a9dc1ce04e81bb7165b90768cca99c1cc8fb872cc6c5ef6d5a428be1c8c722dc70161c6233a425194707572ad92388a77b783f8e62a24a7492bed9f79959f6c8d39d6d14945792badb142e9b70825bde9038cd3af460189efac7251bc618fe588d1624b357c727f73ea7164e34be977018204b91a12ad3ef6e03613bab36bb069f973d0d605ac47b50bad0701c89a443a0287b7ba39e54d770fb82cf48109306b52086a272a1c6498da8006953dba0f1d4ff13a0bf3b6dca3e85856f857d166edcda6687af093a383eea23da3eb85ea6afe1cae63a560600dcf5bcccf07226737c0838d00b7d570d6067a781953c9b76372334360cce640c9d510b9f789606388be87ce6fdb780d50cd4f487cc6926d9c64c512da19e827cd7295ee854c58b0cae220532d95b9a97a46eedc40386589632c087ac7ec8bafa4064a5f9a42bd78559315b2529b09608cb04a08c12d9da87d157ddc88a00bd86af3a30b4ab62360455ae1aedc4489bc7fc0d940a4a9f63652307b1849ac5b28c23e842856a9d473efef88ddff09d57c2b31229761fcb1fc15bc9ad0a0630fb328a0e65bd533a493dac1adcabe217227805ca5afafbf61e87e2741da606e56c92e178b3e51cd2b66306aecebcfdb16d9e8cceaa29f75b20c80844292b97a027119677b94a25006e694fbe60979241b14c5870fba583dc10f7922aad78c26bd6628e3e924f587bac5b7d0fd6b2253533d49e3af0bed439a633dc47b51b625c1d2a947946834cd10cc9fec6018a71fee2448437"}) r4 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$IMGETDEVINFO(r4, 0x80044944, &(0x7f0000000240)={0x40}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x368, &(0x7f0000000680), 0x1}, 0x0) 00:20:04 executing program 5: syz_mount_image$jfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:04 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0xfffffffffffffeeb, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0xffffffffffffffff}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r1, 0x1b}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setxattr$security_capability(0x0, &(0x7f0000000280)='security.capability\x00', &(0x7f00000002c0)=@v2={0x2000000, [{0x0, 0x100}, {0x0, 0x10000}]}, 0x14, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r3, &(0x7f0000001880)="f95f4d693b94d0d5aaf111c58b799f198b8f474c99ec041c187fe4e1751d436362dc685fb2c5e2c12746cb06b399d0d372663db3cff8bcfa8fc3cf2caa975c77ad41adec69ab6abeaf4fe659a945574ac9411180ef2e71012533d52f72c636859f3a5a2896de05384303b929f01b8c5c1b473acda266f5ebb45b6cf2fda34fe44738279c5c2cb30a24295620128284432051b7a80e2ac5f3a682cff216810a1201b79e883a884dbb55abcbac55cb0015fb44f992a9741be0e245997d5f23ed2f725ede4fdddcd5b5e1753752f2023cd7f2ee08736a84976025e871443b89457500607456b8b0cb9541e14ba7142b333e6ad64c8388d1b423749bf364e14f87521b25f8bf0c5d524daa8a4a4c6e8d920805e8246ba6c901b4e0d2ad5e66d57604ca09df67930decbc07c55236e2a5dc34140757b7790222c263b5a9d1b85d8cbbdfa5eb4ca4f27501b7b465d4bbf987e30a78f236a7132bfb815e8ec1de068b7cb43baf7ff6171f61459625b95092b41453a42097cd22e9d65f106d2278c03e33390822b45579ff7ad25ff32cfc54a08616badf3bc4feb5565da5ca2b1f65dd16c9c8f9f18823ceeddc59c3a208698a9345a8ff26341db2414b83868b7f226d750ee224d9c384ff1348f1d553f7277240c3b967fa514891546ed3d30e9e18842cc0589e67b98c10707b1d9b85dbd75888ba157ea60def54cba03691a18d819f952a51fd6581a819767087c31cce2524404f14e0c108c38b4b215caffdfd2deab27ff34c1b0a987ab6147994ee74bc3170c31a0e0ba4048cab675946bfdbd1dd34b3102ecd9ca2ca8363ced19a20d739494c241fed8b197e1a818f1b67ec7974804357e22dcb77e8d5ed92231a3a7d20160bfb88486bfb3337e029779ad694f517f1bc04d25db0e3101d2a1621bb4993b09a76bcf1ac11738e3da28b9dc458cb4ec8c3a648e72fbc64a543fe737077afa758da49e920fa25f321b18935683fee29cea0d095043955f54405ad77a60c7f88bc48afc63fb96fb36eb4e4d2f6470cba79eb55c4270553b57dc4f4e691225ba47d7700ad917f7fb7f24b10b107e6e95940599eb92f5aaba9776ce2e66d8d969bda23e4a7d99c88fbbc0904223fbc54969f2d64bd9dde796dc158aea1003a04dca18867b79fa2f89f9e85bdcf77b93231d03870c7bc6f99cd8db2005aeb0e10470a0094b79e50c53e1e5632b3e9a72a546e44e32c4bdd6728a4ccdc8af57e827a6967c389f7cc2bc9a89af189efb181ea20eb631c5658b73bfd33605a40b3c9091e49747ed5807347c6c6fcce7e4705735586c361e322132b43a37647974b3cd6c7bafa4d5c122b3dc33405dd7afbf463e3075a40003f5b6a8a476adac81d5342ceee379eb8ee0fb505b2272537e440b891dffc053f3f33411262e1e12797cd227458261ac2dd5bb05a47f0144c6e39246d776889d1606d5b10b5ed191a91792f023f7fd2d6e19bf72dfef86209da03a47dfefda72bd8afd0ed915dfc4ab2fc184f0728b6062f32e74195674cba8467c43540f02043b01274bc390b99a7d042ed474fde7db6103b3a031e548edb8aa43a990865155fb8c735c5e17301d90ee879684e06ecf0d6298884", 0x479, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) setsockopt$sock_void(r3, 0x1, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) statx(r0, &(0x7f0000000000)='./file0\x00', 0x7000, 0x4, &(0x7f0000000300)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) 00:20:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x58, r2, 0x613, 0x0, 0x0, {}, [{{0x8, 0x1, r1}, {0x3c, 0x2, [{0x3, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h'}, {0x8, 0x3, 0x5}, {0x8}}}]}}]}, 0x58}}, 0x0) 00:20:04 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nfc_llcp(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x1, 0x5, "cf6a050439886aa727da1e95e36648ed34fe4141360a70d00cf6ba0c17f3d71f9358db8bdbee0ab8d86995f7596db20a179d36c99403f93b296fcab0da2daf", 0x1c}, 0x60, &(0x7f0000000440)=[{&(0x7f00000001c0)="3078491f6fe5231a4fbffeb839f6e5532f06ae969ea950dba833e13f04c1c8630d159650729c923faff3abf6748d37db6f08d08b3f865b0b054102ad27ec1bd32837674f3f7b05bca0ed34703b", 0x4d}, {&(0x7f0000000240)="0e4de60f73c22683e8ffe5ce0cd5c38d49d49c41b84c4079d0255de504560c5758c56b60b402b9cb02c30a56c71b5e4c93ff1bd68a93a241787361d50be3a59839c7edb05c05a797abb9ff6e17c9e5c91a30dd5b8252b4b0b2f993b221509d4b7a4b55f818539136fafecb1c9a6b483179ce7526648785a4576b7f09da317159b11003a16eb4b851dc94f497cc6255c7c2e52a6e6bf9", 0x96}, {&(0x7f0000000080)="2724a51dd23898ae53f16eb024848e9d40244f0d6134fb", 0x17}, {&(0x7f0000000300)="6ff4f6908a6a8165f972396fc094368858d0501e605b9466a4dd4f790e92601cc5bc0017ffe1a6bac105d5ee8c52ad2481e795c1ad8b6cbcbc1563e5b50fb4dcedd11d86aa980c9d26903f551aa52178f21edc47cb82fd592af86e3e398a3cf060b7883cbe721ce20c0874447bac25f6bb7e1bea043ba8e6dc49ff75b09bc95d0d168226dd8ef242e5c39446d296b85a1a885c5ebf5b6bc28a34b3070da8811116a6aaf330477ebdc836081aecf667d8dd6c19bc7d75b4488fa319604159a138e84e22d6839ebe6cb0df399047f3e08c29355445f3035d354d1b", 0xda}, {&(0x7f0000000400)="ff2acf6de5c049dbb003", 0xa}], 0x5, 0x0, 0x0, 0x4000}, 0x841) close(r0) socket$kcm(0x29, 0x5, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000880)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x82000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x1c, r1, 0x0, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000007c0)={0x0, 0x7530}, 0xffffffffffffff6f) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/mixer\x00', 0x48e040, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r4, 0xc1105518, &(0x7f0000000580)={{0x9, 0x2, 0x8ddd, 0x9, 'syz1\x00'}, 0x6, 0x4, 0x3, r5, 0x2, 0x8, 'syz0\x00', &(0x7f0000000540)=['bdev%\x00', '%-em0\\/\'security\x00'], 0x17, [], [0x7, 0x60f5, 0x1ff, 0x5f3]}) ioctl$sock_inet_SIOCDELRT(r4, 0x890c, &(0x7f0000000700)={0x0, {0x2, 0x4e20, @rand_addr=0x3f}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e22, @broadcast}, 0x68, 0x0, 0x0, 0x0, 0x7, &(0x7f00000006c0)='veth0_to_bond\x00', 0x9, 0x9, 0x7}) close(r2) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000009dda30fc00000000000d00000027ec92560986f167c36ee4c29f"], &(0x7f0000000040)=0x31) splice(r0, 0x0, r3, 0x0, 0x3, 0x0) 00:20:04 executing program 5: syz_mount_image$jfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:04 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x400, 0x7, 0x7, 0xffffffff, 0x13, 0x0, 0x0, 0x8000, 0x7, 0xffff, 0x2, 0xf6e}) r1 = socket(0x4000000000000010, 0x3, 0x0) write(r1, &(0x7f0000000200)="fc0000001a00e700ab092500090007001cab80ff0100520200d90d5614000100fd8ed69ad84e3d951e6a5914fe050000000000ba6da9edf27595057d0000030510fa2c1e998656aa0700000046fe0000020704020800008c0000036c6c256f1a272f00897f787467584034d0f302ade01720d7d556272f5baa000005defd5a32c6436e7fbf6ab82088f8e1039fe280fc83ab82f605f30c9ddef2fe082038f4f800000000463283170e5bbab2ccd243f295ed94e0ad91bd388e712f3e3fad2357d42dd16b17e583df150c3b0000000046a6b567b4d5715587e658a1ed7cf80a0000000022000000000000000000000080f3a8e14f92f70ca9dd44b79a", 0xfc) [ 166.731240][ T9417] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 166.745298][ T9420] mmap: syz-executor.1 (9420) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 166.786217][ T9417] netlink: 204 bytes leftover after parsing attributes in process `syz-executor.3'. [ 167.182266][ T9367] attempt to access beyond end of device [ 167.204951][ T9367] loop1: rw=2049, want=78, limit=64 [ 167.210600][ T9367] Buffer I/O error on dev loop1, logical block 77, lost async page write 00:20:05 executing program 1: r0 = syz_open_dev$usb(0x0, 0x80000000006, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) ioctl$KDDISABIO(r0, 0x4b37) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) r1 = timerfd_create(0x0, 0x0) readv(r1, 0x0, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000006, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00008df000/0x6000)=nil, 0x6000, 0x0, 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000008b08b733b87107a144a16e21d679d22cb450960ff7aa6e041a7700fdff86000009f0d5363594f09f8bef41e088d9b90300000000000000cad550fe20353fda841f9d63a232b9b2500fb1d96033ccfdff066428eb4cb7860cfd"], 0x5e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) write$sndseq(r2, &(0x7f0000000080)=[{0x4b2, 0x9e4, 0x100000000, 0x2, @time={0x0, 0x1c9c380}, {0xb5, 0x3b}, {0x8, 0x9}, @connect={{0x2, 0x4}, {0x3, 0x5}}}], 0x30) 00:20:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f0000000000)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000002000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/144], 0x90) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) 00:20:05 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket$kcm(0xa, 0x2, 0x73) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000200)={0xffff, 0xf903, 0x9, 0x1}) bind(r1, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @local}, 0x80) getsockname(r1, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x80) 00:20:05 executing program 5: syz_mount_image$jfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f00000000c0)=""/238, 0xee) fgetxattr(r0, &(0x7f0000000000)=@random={'user.', 'self\x00'}, 0x0, 0x0) 00:20:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xfffffffffffffe47, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="28000000000000000000000004000000140074656d0000005700dbbdc11a28b20099c93b"], 0x28}}, 0x0) 00:20:05 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0xff, 0x8, 0x1, 0x3, 0x8}, &(0x7f0000000240)=0x98) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000380), &(0x7f00000003c0)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={r1, 0x74, &(0x7f0000000280)=[@in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e21, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, @in6={0xa, 0x4e23, 0x3080000000, @empty, 0x8}]}, &(0x7f0000000340)=0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x3c) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000000)) 00:20:05 executing program 2: mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:05 executing program 0: r0 = socket$inet(0x2, 0x1010000000803, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local}, 0xc) 00:20:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_emit_ethernet(0x50, &(0x7f0000000100)={@local, @link_local, [], {@llc={0x4, {@llc={0xfc, 0xff, '9', "ffbfe1e26e9f18fd7d3576dcfd90ea787074cfdbd5a3cd388ce2c16358d20f392caed1594fac496b4c297070ac221692aa87998fdbba4060115425a1c85c7a"}}}}}, 0x0) 00:20:05 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 168.258461][ T9459] attempt to access beyond end of device [ 168.264185][ T9459] loop1: rw=2049, want=78, limit=64 [ 168.270457][ T9459] Buffer I/O error on dev loop1, logical block 77, lost async page write 00:20:06 executing program 1: r0 = syz_open_dev$usb(0x0, 0x80000000006, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) ioctl$KDDISABIO(r0, 0x4b37) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) r1 = timerfd_create(0x0, 0x0) readv(r1, 0x0, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000006, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00008df000/0x6000)=nil, 0x6000, 0x0, 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000008b08b733b87107a144a16e21d679d22cb450960ff7aa6e041a7700fdff86000009f0d5363594f09f8bef41e088d9b90300000000000000cad550fe20353fda841f9d63a232b9b2500fb1d96033ccfdff066428eb4cb7860cfd"], 0x5e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) write$sndseq(r2, &(0x7f0000000080)=[{0x4b2, 0x9e4, 0x100000000, 0x2, @time={0x0, 0x1c9c380}, {0xb5, 0x3b}, {0x8, 0x9}, @connect={{0x2, 0x4}, {0x3, 0x5}}}], 0x30) 00:20:06 executing program 0: r0 = socket$inet(0x2, 0x1010000000803, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local}, 0xc) 00:20:06 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:06 executing program 2: mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r4, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) r6 = gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) sendmsg$kcm(r5, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000c40)="31cda4ee4a8f0234483aa973aeb054eb58ee7b20d91a3fd0acea756556de29738d8af7f4ba74e0bd322b48e35ef3b011c0caaf94", 0x34}], 0x1}, 0x80) recvmsg(r3, &(0x7f0000000b40)={&(0x7f0000000480)=@caif=@rfm, 0x80, 0x0}, 0x40000000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000300)) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x100000001, 0x7, 0x8, 0x3f, 0x0, 0x37, 0x2001, 0x2, 0x6, 0x1, 0xf96, 0x80, 0x43a, 0x7, 0x8f, 0xd70f, 0xa2, 0xfffffffffffffffd, 0x2b73, 0x1, 0x8, 0x5, 0x52e80a75, 0x8, 0x80, 0x8, 0x0, 0x6, 0x1ff, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x7fffffff, 0x8000, 0x9, 0x0, 0xd2f0, 0x2, @perf_config_ext={0x2, 0x6}, 0x8000, 0xffffffff, 0xfffffffffffffffd, 0xf, 0x9, 0x6, 0xffffffffffff4c82}, r6, 0x5, r2, 0x8) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x10297) 00:20:06 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f0000000280)="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") prctl$PR_CAPBSET_DROP(0x18, 0x9) r1 = socket$nl_route(0x10, 0x3, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x10) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x5, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 00:20:06 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 168.538657][ T9512] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 00:20:06 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 168.586274][ T9512] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 00:20:06 executing program 2: mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) [ 168.654885][ T9522] (unnamed net_device) (uninitialized): option downdelay: invalid value (18446744073709551615) [ 168.695885][ T9522] (unnamed net_device) (uninitialized): option downdelay: allowed values 0 - 2147483647 [ 168.748020][ T9516] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 168.802138][ T9516] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 00:20:06 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:20:06 executing program 0: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 169.469935][ T9517] attempt to access beyond end of device [ 169.475908][ T9517] loop1: rw=2049, want=78, limit=64 [ 169.481941][ T9517] Buffer I/O error on dev loop1, logical block 77, lost async page write 00:20:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r4, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) r6 = gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) sendmsg$kcm(r5, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000c40)="31cda4ee4a8f0234483aa973aeb054eb58ee7b20d91a3fd0acea756556de29738d8af7f4ba74e0bd322b48e35ef3b011c0caaf94", 0x34}], 0x1}, 0x80) recvmsg(r3, &(0x7f0000000b40)={&(0x7f0000000480)=@caif=@rfm, 0x80, 0x0}, 0x40000000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000300)) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x100000001, 0x7, 0x8, 0x3f, 0x0, 0x37, 0x2001, 0x2, 0x6, 0x1, 0xf96, 0x80, 0x43a, 0x7, 0x8f, 0xd70f, 0xa2, 0xfffffffffffffffd, 0x2b73, 0x1, 0x8, 0x5, 0x52e80a75, 0x8, 0x80, 0x8, 0x0, 0x6, 0x1ff, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x7fffffff, 0x8000, 0x9, 0x0, 0xd2f0, 0x2, @perf_config_ext={0x2, 0x6}, 0x8000, 0xffffffff, 0xfffffffffffffffd, 0xf, 0x9, 0x6, 0xffffffffffff4c82}, r6, 0x5, r2, 0x8) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x10297) 00:20:07 executing program 2: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:07 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x202c01, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000080)={r0}) 00:20:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x8}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x7) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100c1, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 00:20:07 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:20:07 executing program 2: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:07 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 169.755037][ T9574] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 00:20:07 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:07 executing program 2: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) [ 169.923701][ T9574] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 00:20:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x8}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x7) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100c1, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 00:20:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x202c01, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000080)={r0}) 00:20:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r4, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) r6 = gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) sendmsg$kcm(r5, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000c40)="31cda4ee4a8f0234483aa973aeb054eb58ee7b20d91a3fd0acea756556de29738d8af7f4ba74e0bd322b48e35ef3b011c0caaf94", 0x34}], 0x1}, 0x80) recvmsg(r3, &(0x7f0000000b40)={&(0x7f0000000480)=@caif=@rfm, 0x80, 0x0}, 0x40000000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000300)) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x100000001, 0x7, 0x8, 0x3f, 0x0, 0x37, 0x2001, 0x2, 0x6, 0x1, 0xf96, 0x80, 0x43a, 0x7, 0x8f, 0xd70f, 0xa2, 0xfffffffffffffffd, 0x2b73, 0x1, 0x8, 0x5, 0x52e80a75, 0x8, 0x80, 0x8, 0x0, 0x6, 0x1ff, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x7fffffff, 0x8000, 0x9, 0x0, 0xd2f0, 0x2, @perf_config_ext={0x2, 0x6}, 0x8000, 0xffffffff, 0xfffffffffffffffd, 0xf, 0x9, 0x6, 0xffffffffffff4c82}, r6, 0x5, r2, 0x8) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x10297) 00:20:08 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:08 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) 00:20:08 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) [ 170.259951][ T9601] jfs: Unrecognized mount option "defcontext=staff_u" or missing value 00:20:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x8}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x7) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100c1, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 00:20:08 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:08 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:08 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) [ 170.631397][ T9620] jfs: Unrecognized mount option "defcontext=staff_u" or missing value 00:20:08 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) 00:20:08 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 170.774376][ T9613] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 00:20:08 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) [ 170.875248][ T9613] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 170.962375][ T9639] jfs: Unrecognized mount option "defcontext=staff_u" or missing value 00:20:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x202c01, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000080)={r0}) 00:20:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r4, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) r6 = gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) sendmsg$kcm(r5, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000c40)="31cda4ee4a8f0234483aa973aeb054eb58ee7b20d91a3fd0acea756556de29738d8af7f4ba74e0bd322b48e35ef3b011c0caaf94", 0x34}], 0x1}, 0x80) recvmsg(r3, &(0x7f0000000b40)={&(0x7f0000000480)=@caif=@rfm, 0x80, 0x0}, 0x40000000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000300)) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x100000001, 0x7, 0x8, 0x3f, 0x0, 0x37, 0x2001, 0x2, 0x6, 0x1, 0xf96, 0x80, 0x43a, 0x7, 0x8f, 0xd70f, 0xa2, 0xfffffffffffffffd, 0x2b73, 0x1, 0x8, 0x5, 0x52e80a75, 0x8, 0x80, 0x8, 0x0, 0x6, 0x1ff, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x7fffffff, 0x8000, 0x9, 0x0, 0xd2f0, 0x2, @perf_config_ext={0x2, 0x6}, 0x8000, 0xffffffff, 0xfffffffffffffffd, 0xf, 0x9, 0x6, 0xffffffffffff4c82}, r6, 0x5, r2, 0x8) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x10297) 00:20:09 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) 00:20:09 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) 00:20:09 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), 0x0, 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:09 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}]}) 00:20:09 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:09 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), 0x0, 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:09 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) [ 171.542824][ T9675] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 00:20:09 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r2, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:09 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}]}) [ 171.667163][ T9675] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 00:20:09 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), 0x0, 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x202c01, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000080)={r0}) 00:20:10 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) 00:20:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r4, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) r6 = gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) sendmsg$kcm(r5, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000c40)="31cda4ee4a8f0234483aa973aeb054eb58ee7b20d91a3fd0acea756556de29738d8af7f4ba74e0bd322b48e35ef3b011c0caaf94", 0x34}], 0x1}, 0x80) recvmsg(r3, &(0x7f0000000b40)={&(0x7f0000000480)=@caif=@rfm, 0x80, 0x0}, 0x40000000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000300)) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x100000001, 0x7, 0x8, 0x3f, 0x0, 0x37, 0x2001, 0x2, 0x6, 0x1, 0xf96, 0x80, 0x43a, 0x7, 0x8f, 0xd70f, 0xa2, 0xfffffffffffffffd, 0x2b73, 0x1, 0x8, 0x5, 0x52e80a75, 0x8, 0x80, 0x8, 0x0, 0x6, 0x1ff, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x7fffffff, 0x8000, 0x9, 0x0, 0xd2f0, 0x2, @perf_config_ext={0x2, 0x6}, 0x8000, 0xffffffff, 0xfffffffffffffffd, 0xf, 0x9, 0x6, 0xffffffffffff4c82}, r6, 0x5, r2, 0x8) 00:20:10 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r2, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:10 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}]}) 00:20:10 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:10 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r2, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:10 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r2, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:10 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r2, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) sendmsg$kcm(r4, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000c40)="31cda4ee4a8f0234483aa973aeb054eb58ee7b20d91a3fd0acea756556de29738d8af7f4ba74e0bd322b48e35ef3b011c0caaf94", 0x34}], 0x1}, 0x80) recvmsg(r2, &(0x7f0000000b40)={&(0x7f0000000480)=@caif=@rfm, 0x80, 0x0}, 0x40000000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000300)) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 00:20:10 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r4, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) r6 = gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) sendmsg$kcm(r5, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000c40)="31cda4ee4a8f0234483aa973aeb054eb58ee7b20d91a3fd0acea756556de29738d8af7f4ba74e0bd322b48e35ef3b011c0caaf94", 0x34}], 0x1}, 0x80) recvmsg(r3, &(0x7f0000000b40)={&(0x7f0000000480)=@caif=@rfm, 0x80, 0x0}, 0x40000000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000300)) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x100000001, 0x7, 0x8, 0x3f, 0x0, 0x37, 0x2001, 0x2, 0x6, 0x1, 0xf96, 0x80, 0x43a, 0x7, 0x8f, 0xd70f, 0xa2, 0xfffffffffffffffd, 0x2b73, 0x1, 0x8, 0x5, 0x52e80a75, 0x8, 0x80, 0x8, 0x0, 0x6, 0x1ff, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x7fffffff, 0x8000, 0x9, 0x0, 0xd2f0, 0x2, @perf_config_ext={0x2, 0x6}, 0x8000, 0xffffffff, 0xfffffffffffffffd, 0xf, 0x9, 0x6, 0xffffffffffff4c82}, r6, 0x5, r2, 0x8) 00:20:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x202c01, 0x0) 00:20:11 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:11 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r2, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:11 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) sendmsg$kcm(r4, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000c40)="31cda4ee4a8f0234483aa973aeb054eb58ee7b20d91a3fd0acea756556de29738d8af7f4ba74e0bd322b48e35ef3b011c0caaf94", 0x34}], 0x1}, 0x80) recvmsg(r2, &(0x7f0000000b40)={&(0x7f0000000480)=@caif=@rfm, 0x80, 0x0}, 0x40000000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000300)) 00:20:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r4, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) r6 = gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) sendmsg$kcm(r5, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000c40)="31cda4ee4a8f0234483aa973aeb054eb58ee7b20d91a3fd0acea756556de29738d8af7f4ba74e0bd322b48e35ef3b011c0caaf94", 0x34}], 0x1}, 0x80) recvmsg(r3, &(0x7f0000000b40)={&(0x7f0000000480)=@caif=@rfm, 0x80, 0x0}, 0x40000000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000300)) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x100000001, 0x7, 0x8, 0x3f, 0x0, 0x37, 0x2001, 0x2, 0x6, 0x1, 0xf96, 0x80, 0x43a, 0x7, 0x8f, 0xd70f, 0xa2, 0xfffffffffffffffd, 0x2b73, 0x1, 0x8, 0x5, 0x52e80a75, 0x8, 0x80, 0x8, 0x0, 0x6, 0x1ff, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x7fffffff, 0x8000, 0x9, 0x0, 0xd2f0, 0x2, @perf_config_ext={0x2, 0x6}, 0x8000, 0xffffffff, 0xfffffffffffffffd, 0xf, 0x9, 0x6, 0xffffffffffff4c82}, r6, 0x5, r2, 0x8) 00:20:11 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:11 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r2, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:11 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 173.555697][ T9783] EXT4-fs warning: 6 callbacks suppressed [ 173.555720][ T9783] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 173.670372][ T9783] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 00:20:11 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:11 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:11 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x202c01, 0x0) 00:20:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) sendmsg$kcm(r4, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000c40)="31cda4ee4a8f0234483aa973aeb054eb58ee7b20d91a3fd0acea756556de29738d8af7f4ba74e0bd322b48e35ef3b011c0caaf94", 0x34}], 0x1}, 0x80) recvmsg(r2, &(0x7f0000000b40)={&(0x7f0000000480)=@caif=@rfm, 0x80, 0x0}, 0x40000000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:12 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:12 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:12 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:12 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:12 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) [ 174.603336][ T9836] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 00:20:12 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:12 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 174.658540][ T9836] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 00:20:12 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) sendmsg$kcm(r4, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000c40)="31cda4ee4a8f0234483aa973aeb054eb58ee7b20d91a3fd0acea756556de29738d8af7f4ba74e0bd322b48e35ef3b011c0caaf94", 0x34}], 0x1}, 0x80) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:13 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:13 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:13 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 175.246911][ T9870] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 00:20:13 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 175.307226][ T9870] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 00:20:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:13 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:13 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:13 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:13 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:13 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, 0x0) [ 175.897113][ T9898] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 00:20:14 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 176.030740][ T9898] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 176.191650][ T9910] EXT4-fs (sda1): re-mounted. Opts: 00:20:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:14 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:14 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:14 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, 0x0) 00:20:14 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) [ 176.609521][ T9931] EXT4-fs (sda1): re-mounted. Opts: [ 176.637593][ T9940] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 176.671135][ T9940] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 00:20:14 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, 0x0) 00:20:14 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) gettid() ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) [ 176.983060][ T9951] EXT4-fs (sda1): re-mounted. Opts: 00:20:15 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)) 00:20:15 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:15 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) gettid() ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) [ 177.421303][ T9969] EXT4-fs (sda1): re-mounted. Opts: 00:20:15 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:15 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)) 00:20:15 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 177.856736][ T9987] EXT4-fs (sda1): re-mounted. Opts: 00:20:16 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:16 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:16 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:16 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)) 00:20:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:16 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) [ 178.392843][T10016] EXT4-fs (sda1): re-mounted. Opts: 00:20:16 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:16 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:16 executing program 2: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:16 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 178.680461][T10034] EXT4-fs warning: 4 callbacks suppressed [ 178.680484][T10034] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 00:20:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:16 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 178.749093][T10034] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 00:20:16 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:17 executing program 2: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:17 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 179.126966][T10055] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 00:20:17 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 179.184859][T10055] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 00:20:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:17 executing program 2: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:17 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:17 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 179.710650][T10081] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 00:20:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) [ 179.824008][T10081] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 00:20:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:18 executing program 2: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:18 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 180.070869][T10092] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 00:20:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x202c01, 0x0) 00:20:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) gettid() ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) [ 180.176643][T10092] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 00:20:18 executing program 2: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:18 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f0000000200)=0xe, 0x80800) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:18 executing program 2: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r2, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 180.632067][T10119] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 180.706834][T10119] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 00:20:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:18 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r2, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:19 executing program 2: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r2, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:19 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:19 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r2, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:19 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:19 executing program 2: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:19 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) 00:20:19 executing program 2: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:19 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000340)={0x0, @motion_det}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:20 executing program 5: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) 00:20:20 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:20 executing program 2: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) 00:20:20 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)='\xee\\md5sum\x00', 0xfffffffffffffff8) r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10000) write$P9_RWALK(r3, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x43, 0x0, 0x7}, {0x0, 0x4, 0x6}, {0x1, 0x3, 0x4}, {0x0, 0x2, 0x1}, {0x0, 0x2, 0x6}]}}, 0x4a) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) 00:20:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x8000000000400005) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:20 executing program 5 (fault-call:2 fault-nth:0): mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) [ 182.448271][T10207] FAULT_INJECTION: forcing a failure. [ 182.448271][T10207] name failslab, interval 1, probability 0, space 0, times 1 00:20:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) [ 182.522255][T10207] CPU: 0 PID: 10207 Comm: syz-executor.5 Not tainted 5.2.0-next-20190708 #33 [ 182.531069][T10207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.541138][T10207] Call Trace: [ 182.544453][T10207] dump_stack+0x172/0x1f0 [ 182.548804][T10207] should_fail.cold+0xa/0x15 [ 182.553422][T10207] ? fault_create_debugfs_attr+0x180/0x180 [ 182.559260][T10207] ? ___might_sleep+0x163/0x280 [ 182.564168][T10207] __should_failslab+0x121/0x190 [ 182.569140][T10207] should_failslab+0x9/0x14 [ 182.573659][T10207] __kmalloc+0x2e0/0x770 [ 182.577916][T10207] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 182.584174][T10207] ? fput_many+0x12c/0x1a0 [ 182.588599][T10207] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 182.588615][T10207] ? strnlen_user+0x1ed/0x2e0 [ 182.588632][T10207] ? __x64_sys_memfd_create+0x13c/0x470 [ 182.588651][T10207] __x64_sys_memfd_create+0x13c/0x470 [ 182.588669][T10207] ? memfd_fcntl+0x1580/0x1580 [ 182.588692][T10207] ? do_syscall_64+0x26/0x6a0 [ 182.599706][T10207] ? lockdep_hardirqs_on+0x418/0x5d0 [ 182.599727][T10207] ? trace_hardirqs_on+0x67/0x240 [ 182.599747][T10207] do_syscall_64+0xfd/0x6a0 [ 182.599770][T10207] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.599782][T10207] RIP: 0033:0x4597c9 [ 182.599798][T10207] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:20:20 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDDELIO(r0, 0x541d, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) [ 182.599806][T10207] RSP: 002b:00007ff864e1fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 182.599828][T10207] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597c9 [ 182.681280][T10207] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be6cc [ 182.689269][T10207] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 182.697254][T10207] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff864e206d4 [ 182.697264][T10207] R13: 00000000004c8748 R14: 00000000004df338 R15: 0000000000000003 [ 182.775067][T10223] FAULT_INJECTION: forcing a failure. [ 182.775067][T10223] name failslab, interval 1, probability 0, space 0, times 1 [ 182.803525][T10223] CPU: 0 PID: 10223 Comm: syz-executor.2 Not tainted 5.2.0-next-20190708 #33 [ 182.812353][T10223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 00:20:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7f) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x2, 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) [ 182.812362][T10223] Call Trace: [ 182.812395][T10223] dump_stack+0x172/0x1f0 [ 182.812435][T10223] should_fail.cold+0xa/0x15 [ 182.834696][T10223] ? fault_create_debugfs_attr+0x180/0x180 [ 182.840522][T10223] ? ___might_sleep+0x163/0x280 [ 182.845397][T10223] __should_failslab+0x121/0x190 [ 182.850364][T10223] should_failslab+0x9/0x14 [ 182.854889][T10223] __kmalloc+0x2e0/0x770 [ 182.854909][T10223] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 182.854927][T10223] ? fput_many+0x12c/0x1a0 [ 182.854950][T10223] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 182.869889][T10223] ? strnlen_user+0x1ed/0x2e0 [ 182.869910][T10223] ? __x64_sys_memfd_create+0x13c/0x470 [ 182.869931][T10223] __x64_sys_memfd_create+0x13c/0x470 [ 182.869950][T10223] ? memfd_fcntl+0x1580/0x1580 [ 182.869968][T10223] ? do_syscall_64+0x26/0x6a0 [ 182.869993][T10223] ? lockdep_hardirqs_on+0x418/0x5d0 [ 182.880940][T10223] ? trace_hardirqs_on+0x67/0x240 [ 182.880965][T10223] do_syscall_64+0xfd/0x6a0 [ 182.880989][T10223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.881010][T10223] RIP: 0033:0x4597c9 [ 182.911710][T10223] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 182.911721][T10223] RSP: 002b:00007fc657032a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 182.911737][T10223] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597c9 [ 182.911746][T10223] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be6cc 00:20:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) [ 182.911755][T10223] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 182.911764][T10223] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc6570336d4 [ 182.911781][T10223] R13: 00000000004c87cb R14: 00000000004df3c8 R15: 0000000000000003 00:20:21 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r0 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) recvfrom$ax25(r0, &(0x7f0000000380)=""/171, 0xab, 0x1, &(0x7f0000000440)={{0x3, @bcast}, [@null, @default, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4c4100, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18, 0x71, 0x1, {{0x3232458b7756e6b9, 0x2, 0x3}, 0x3}}, 0x18) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000100), &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000240), &(0x7f0000000280)=0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000004c0)=0x2, 0x4) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f00000000c0)=0x20, 0xffffffffffffff58) 00:20:21 executing program 5 (fault-call:2 fault-nth:1): mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7f) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:21 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 183.378364][T10244] FAULT_INJECTION: forcing a failure. [ 183.378364][T10244] name failslab, interval 1, probability 0, space 0, times 0 [ 183.394755][T10247] FAULT_INJECTION: forcing a failure. [ 183.394755][T10247] name failslab, interval 1, probability 0, space 0, times 0 [ 183.437892][T10247] CPU: 1 PID: 10247 Comm: syz-executor.2 Not tainted 5.2.0-next-20190708 #33 [ 183.446710][T10247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.456781][T10247] Call Trace: [ 183.460098][T10247] dump_stack+0x172/0x1f0 [ 183.464477][T10247] should_fail.cold+0xa/0x15 [ 183.469097][T10247] ? fault_create_debugfs_attr+0x180/0x180 [ 183.474930][T10247] ? ___might_sleep+0x163/0x280 [ 183.479800][T10247] __should_failslab+0x121/0x190 [ 183.484750][T10247] ? shmem_destroy_inode+0x80/0x80 [ 183.489876][T10247] should_failslab+0x9/0x14 [ 183.494399][T10247] kmem_cache_alloc+0x2aa/0x710 [ 183.499267][T10247] ? __alloc_fd+0x487/0x620 [ 183.504314][T10247] ? shmem_destroy_inode+0x80/0x80 [ 183.509441][T10247] shmem_alloc_inode+0x1c/0x50 [ 183.514227][T10247] alloc_inode+0x68/0x1e0 [ 183.518593][T10247] new_inode_pseudo+0x19/0xf0 [ 183.523308][T10247] new_inode+0x1f/0x40 [ 183.527495][T10247] shmem_get_inode+0x84/0x7e0 [ 183.532210][T10247] __shmem_file_setup.part.0+0x7e/0x2b0 [ 183.537788][T10247] shmem_file_setup+0x66/0x90 [ 183.542490][T10247] __x64_sys_memfd_create+0x2a2/0x470 [ 183.547896][T10247] ? memfd_fcntl+0x1580/0x1580 [ 183.552684][T10247] ? do_syscall_64+0x26/0x6a0 [ 183.557502][T10247] ? lockdep_hardirqs_on+0x418/0x5d0 [ 183.562815][T10247] ? trace_hardirqs_on+0x67/0x240 [ 183.567870][T10247] do_syscall_64+0xfd/0x6a0 [ 183.572392][T10247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.578290][T10247] RIP: 0033:0x4597c9 [ 183.582198][T10247] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 183.601814][T10247] RSP: 002b:00007fc657032a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 183.610243][T10247] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597c9 [ 183.618225][T10247] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be6cc [ 183.626217][T10247] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 00:20:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) [ 183.634214][T10247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc6570336d4 [ 183.642193][T10247] R13: 00000000004c87cb R14: 00000000004df3c8 R15: 0000000000000003 [ 183.654750][T10244] CPU: 0 PID: 10244 Comm: syz-executor.5 Not tainted 5.2.0-next-20190708 #33 [ 183.663573][T10244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.673674][T10244] Call Trace: [ 183.677000][T10244] dump_stack+0x172/0x1f0 [ 183.681378][T10244] should_fail.cold+0xa/0x15 00:20:21 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 183.686019][T10244] ? fault_create_debugfs_attr+0x180/0x180 [ 183.691845][T10244] ? ___might_sleep+0x163/0x280 [ 183.696711][T10244] __should_failslab+0x121/0x190 [ 183.701658][T10244] ? shmem_destroy_inode+0x80/0x80 [ 183.706773][T10244] should_failslab+0x9/0x14 [ 183.706789][T10244] kmem_cache_alloc+0x2aa/0x710 [ 183.706804][T10244] ? __alloc_fd+0x487/0x620 [ 183.706823][T10244] ? shmem_destroy_inode+0x80/0x80 [ 183.706842][T10244] shmem_alloc_inode+0x1c/0x50 [ 183.730634][T10244] alloc_inode+0x68/0x1e0 [ 183.734982][T10244] new_inode_pseudo+0x19/0xf0 [ 183.739669][T10244] new_inode+0x1f/0x40 [ 183.743754][T10244] shmem_get_inode+0x84/0x7e0 [ 183.748469][T10244] __shmem_file_setup.part.0+0x7e/0x2b0 [ 183.754054][T10244] shmem_file_setup+0x66/0x90 [ 183.758746][T10244] __x64_sys_memfd_create+0x2a2/0x470 [ 183.758763][T10244] ? memfd_fcntl+0x1580/0x1580 [ 183.758777][T10244] ? do_syscall_64+0x26/0x6a0 [ 183.758796][T10244] ? lockdep_hardirqs_on+0x418/0x5d0 [ 183.758820][T10244] ? trace_hardirqs_on+0x67/0x240 [ 183.783935][T10244] do_syscall_64+0xfd/0x6a0 [ 183.789036][T10244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.794954][T10244] RIP: 0033:0x4597c9 [ 183.795344][T10257] FAULT_INJECTION: forcing a failure. [ 183.795344][T10257] name failslab, interval 1, probability 0, space 0, times 0 [ 183.798875][T10244] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:20:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:21 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r0 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 183.798885][T10244] RSP: 002b:00007ff864e1fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 183.798898][T10244] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597c9 [ 183.798907][T10244] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be6cc [ 183.798915][T10244] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 183.798924][T10244] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff864e206d4 [ 183.798933][T10244] R13: 00000000004c8748 R14: 00000000004df338 R15: 0000000000000003 [ 183.977551][T10257] CPU: 0 PID: 10257 Comm: syz-executor.2 Not tainted 5.2.0-next-20190708 #33 [ 183.986390][T10257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.996473][T10257] Call Trace: [ 183.999780][T10257] dump_stack+0x172/0x1f0 [ 184.004150][T10257] should_fail.cold+0xa/0x15 [ 184.008766][T10257] ? fault_create_debugfs_attr+0x180/0x180 [ 184.014626][T10257] ? ___might_sleep+0x163/0x280 [ 184.019500][T10257] __should_failslab+0x121/0x190 [ 184.024490][T10257] should_failslab+0x9/0x14 [ 184.029010][T10257] kmem_cache_alloc+0x2aa/0x710 [ 184.033876][T10257] ? current_time+0x6b/0x140 [ 184.038483][T10257] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 184.044303][T10257] ? lockdep_hardirqs_on+0x418/0x5d0 [ 184.049598][T10257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 184.049615][T10257] ? timespec64_trunc+0xf0/0x180 [ 184.049631][T10257] __d_alloc+0x2e/0x8c0 [ 184.049649][T10257] d_alloc_pseudo+0x1e/0x70 [ 184.049669][T10257] alloc_file_pseudo+0xe2/0x280 00:20:22 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r0 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:22 executing program 5 (fault-call:2 fault-nth:2): mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) [ 184.049689][T10257] ? alloc_file+0x4d0/0x4d0 [ 184.074354][T10257] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 184.085104][T10257] __shmem_file_setup.part.0+0x108/0x2b0 [ 184.085129][T10257] shmem_file_setup+0x66/0x90 [ 184.085151][T10257] __x64_sys_memfd_create+0x2a2/0x470 [ 184.085177][T10257] ? memfd_fcntl+0x1580/0x1580 [ 184.105600][T10257] ? do_syscall_64+0x26/0x6a0 [ 184.110309][T10257] ? lockdep_hardirqs_on+0x418/0x5d0 [ 184.115619][T10257] ? trace_hardirqs_on+0x67/0x240 [ 184.120666][T10257] do_syscall_64+0xfd/0x6a0 [ 184.125213][T10257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.131122][T10257] RIP: 0033:0x4597c9 [ 184.135020][T10257] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.154639][T10257] RSP: 002b:00007fc657032a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 184.163081][T10257] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597c9 [ 184.171086][T10257] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be6cc [ 184.179087][T10257] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 184.187110][T10257] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc6570336d4 [ 184.195302][T10257] R13: 00000000004c87cb R14: 00000000004df3c8 R15: 0000000000000003 00:20:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) recvfrom$ax25(r0, &(0x7f0000000380)=""/171, 0xab, 0x1, &(0x7f0000000440)={{0x3, @bcast}, [@null, @default, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4c4100, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18, 0x71, 0x1, {{0x3232458b7756e6b9, 0x2, 0x3}, 0x3}}, 0x18) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000100), &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000240), &(0x7f0000000280)=0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000004c0)=0x2, 0x4) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f00000000c0)=0x20, 0xffffffffffffff58) 00:20:22 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 184.254043][T10269] EXT4-fs warning: 12 callbacks suppressed [ 184.254062][T10269] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 00:20:22 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 184.395552][T10281] FAULT_INJECTION: forcing a failure. [ 184.395552][T10281] name failslab, interval 1, probability 0, space 0, times 0 [ 184.399642][T10269] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 184.471025][T10281] CPU: 1 PID: 10281 Comm: syz-executor.5 Not tainted 5.2.0-next-20190708 #33 [ 184.479937][T10281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.490101][T10281] Call Trace: [ 184.493433][T10281] dump_stack+0x172/0x1f0 [ 184.497822][T10281] should_fail.cold+0xa/0x15 [ 184.502433][T10281] ? fault_create_debugfs_attr+0x180/0x180 [ 184.508255][T10281] ? ___might_sleep+0x163/0x280 [ 184.508276][T10281] __should_failslab+0x121/0x190 [ 184.508296][T10281] should_failslab+0x9/0x14 [ 184.508310][T10281] kmem_cache_alloc+0x2aa/0x710 [ 184.508325][T10281] ? current_time+0x6b/0x140 [ 184.508339][T10281] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 184.508364][T10281] ? lockdep_hardirqs_on+0x418/0x5d0 [ 184.543177][T10281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 184.549455][T10281] ? timespec64_trunc+0xf0/0x180 [ 184.554416][T10281] __d_alloc+0x2e/0x8c0 [ 184.558598][T10281] d_alloc_pseudo+0x1e/0x70 [ 184.563126][T10281] alloc_file_pseudo+0xe2/0x280 00:20:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:22 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 184.568007][T10281] ? alloc_file+0x4d0/0x4d0 [ 184.572533][T10281] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 184.578901][T10281] __shmem_file_setup.part.0+0x108/0x2b0 [ 184.584579][T10281] shmem_file_setup+0x66/0x90 [ 184.589295][T10281] __x64_sys_memfd_create+0x2a2/0x470 [ 184.594691][T10281] ? memfd_fcntl+0x1580/0x1580 [ 184.599461][T10281] ? do_syscall_64+0x26/0x6a0 [ 184.599482][T10281] ? lockdep_hardirqs_on+0x418/0x5d0 [ 184.599502][T10281] ? trace_hardirqs_on+0x67/0x240 [ 184.599520][T10281] do_syscall_64+0xfd/0x6a0 [ 184.599543][T10281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.599554][T10281] RIP: 0033:0x4597c9 [ 184.599568][T10281] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.599576][T10281] RSP: 002b:00007ff864e1fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 184.599589][T10281] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597c9 00:20:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) [ 184.599598][T10281] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be6cc [ 184.599607][T10281] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 184.599615][T10281] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff864e206d4 [ 184.599631][T10281] R13: 00000000004c8748 R14: 00000000004df338 R15: 0000000000000003 [ 184.733596][T10296] FAULT_INJECTION: forcing a failure. [ 184.733596][T10296] name failslab, interval 1, probability 0, space 0, times 0 [ 184.758336][T10298] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 184.771248][T10298] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 00:20:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) recvfrom$ax25(r0, &(0x7f0000000380)=""/171, 0xab, 0x1, &(0x7f0000000440)={{0x3, @bcast}, [@null, @default, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4c4100, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18, 0x71, 0x1, {{0x3232458b7756e6b9, 0x2, 0x3}, 0x3}}, 0x18) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000100), &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000240), &(0x7f0000000280)=0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000004c0)=0x2, 0x4) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f00000000c0)=0x20, 0xffffffffffffff58) 00:20:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) [ 184.804304][T10296] CPU: 1 PID: 10296 Comm: syz-executor.2 Not tainted 5.2.0-next-20190708 #33 [ 184.813116][T10296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.823190][T10296] Call Trace: [ 184.826516][T10296] dump_stack+0x172/0x1f0 [ 184.830887][T10296] should_fail.cold+0xa/0x15 [ 184.835505][T10296] ? fault_create_debugfs_attr+0x180/0x180 [ 184.841350][T10296] ? ___might_sleep+0x163/0x280 [ 184.846222][T10296] __should_failslab+0x121/0x190 00:20:22 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 184.851174][T10296] should_failslab+0x9/0x14 [ 184.855692][T10296] kmem_cache_alloc+0x2aa/0x710 [ 184.860569][T10296] ? rwlock_bug.part.0+0x90/0x90 [ 184.865533][T10296] ? lock_downgrade+0x920/0x920 [ 184.870408][T10296] __alloc_file+0x27/0x300 [ 184.874852][T10296] alloc_empty_file+0x72/0x170 [ 184.879634][T10296] alloc_file+0x5e/0x4d0 [ 184.883886][T10296] alloc_file_pseudo+0x189/0x280 [ 184.888881][T10296] ? alloc_file+0x4d0/0x4d0 [ 184.893409][T10296] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 184.899671][T10296] __shmem_file_setup.part.0+0x108/0x2b0 [ 184.905340][T10296] shmem_file_setup+0x66/0x90 [ 184.910036][T10296] __x64_sys_memfd_create+0x2a2/0x470 [ 184.915426][T10296] ? memfd_fcntl+0x1580/0x1580 [ 184.920201][T10296] ? do_syscall_64+0x26/0x6a0 [ 184.924884][T10296] ? lockdep_hardirqs_on+0x418/0x5d0 [ 184.930195][T10296] ? trace_hardirqs_on+0x67/0x240 [ 184.935243][T10296] do_syscall_64+0xfd/0x6a0 [ 184.939780][T10296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.945692][T10296] RIP: 0033:0x4597c9 [ 184.949604][T10296] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.969609][T10296] RSP: 002b:00007fc657032a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 184.978046][T10296] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597c9 [ 184.986046][T10296] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be6cc [ 184.994039][T10296] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 00:20:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) [ 185.002029][T10296] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc6570336d4 [ 185.010018][T10296] R13: 00000000004c87cb R14: 00000000004df3c8 R15: 0000000000000003 00:20:23 executing program 5 (fault-call:2 fault-nth:3): mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)=0x6, 0x91) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:23 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 185.224549][T10318] FAULT_INJECTION: forcing a failure. [ 185.224549][T10318] name failslab, interval 1, probability 0, space 0, times 0 [ 185.253364][T10315] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 00:20:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) recvfrom$ax25(r0, &(0x7f0000000380)=""/171, 0xab, 0x1, &(0x7f0000000440)={{0x3, @bcast}, [@null, @default, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4c4100, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18, 0x71, 0x1, {{0x3232458b7756e6b9, 0x2, 0x3}, 0x3}}, 0x18) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000100), &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000240), &(0x7f0000000280)=0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000004c0)=0x2, 0x4) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f00000000c0)=0x20, 0xffffffffffffff58) [ 185.276868][T10318] CPU: 1 PID: 10318 Comm: syz-executor.5 Not tainted 5.2.0-next-20190708 #33 [ 185.285699][T10318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.295777][T10318] Call Trace: [ 185.299092][T10318] dump_stack+0x172/0x1f0 [ 185.303456][T10318] should_fail.cold+0xa/0x15 [ 185.308078][T10318] ? fault_create_debugfs_attr+0x180/0x180 [ 185.313929][T10318] ? ___might_sleep+0x163/0x280 [ 185.318843][T10318] __should_failslab+0x121/0x190 [ 185.323843][T10318] should_failslab+0x9/0x14 [ 185.326527][T10315] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 185.328370][T10318] kmem_cache_alloc+0x2aa/0x710 [ 185.328390][T10318] ? rwlock_bug.part.0+0x90/0x90 [ 185.328415][T10318] ? lock_downgrade+0x920/0x920 [ 185.353498][T10318] __alloc_file+0x27/0x300 [ 185.357940][T10318] alloc_empty_file+0x72/0x170 [ 185.362721][T10318] alloc_file+0x5e/0x4d0 [ 185.367025][T10318] alloc_file_pseudo+0x189/0x280 [ 185.371987][T10318] ? alloc_file+0x4d0/0x4d0 [ 185.377053][T10318] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 185.383339][T10318] __shmem_file_setup.part.0+0x108/0x2b0 [ 185.389007][T10318] shmem_file_setup+0x66/0x90 [ 185.389030][T10318] __x64_sys_memfd_create+0x2a2/0x470 [ 185.389047][T10318] ? memfd_fcntl+0x1580/0x1580 [ 185.389064][T10318] ? do_syscall_64+0x26/0x6a0 [ 185.389088][T10318] ? lockdep_hardirqs_on+0x418/0x5d0 [ 185.413937][T10318] ? trace_hardirqs_on+0x67/0x240 [ 185.418994][T10318] do_syscall_64+0xfd/0x6a0 00:20:23 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) [ 185.423519][T10318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.429418][T10318] RIP: 0033:0x4597c9 [ 185.433427][T10318] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.453049][T10318] RSP: 002b:00007ff864e1fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 185.466167][T10318] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597c9 [ 185.474183][T10318] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be6cc [ 185.482186][T10318] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 185.490178][T10318] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff864e206d4 [ 185.498162][T10318] R13: 00000000004c8748 R14: 00000000004df338 R15: 0000000000000003 00:20:23 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x100, 0x1000, 0x5, 0x0, 0x0, 0x0, 0xe, 0x5, 0x7fff, 0x7, 0x0, 0x5, 0x0, 0x6, 0x4, 0xcad, 0x4, 0x0, 0x1, 0x7, 0x4f29b544, 0x7a, 0x4, 0x5, 0x401, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x0, 0xfffffffffffffff9, 0x4, 0xf4, 0x0, 0x0, 0x380000000000, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x3, 0x7, 0xa92, 0x1ff, 0x7fff}, r0, 0x0, r0, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) [ 185.603365][T10333] FAULT_INJECTION: forcing a failure. [ 185.603365][T10333] name failslab, interval 1, probability 0, space 0, times 0 00:20:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:23 executing program 5 (fault-call:2 fault-nth:4): mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) recvfrom$ax25(r0, &(0x7f0000000380)=""/171, 0xab, 0x1, &(0x7f0000000440)={{0x3, @bcast}, [@null, @default, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4c4100, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18, 0x71, 0x1, {{0x3232458b7756e6b9, 0x2, 0x3}, 0x3}}, 0x18) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000100), &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000240), &(0x7f0000000280)=0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000004c0)=0x2, 0x4) [ 185.765258][T10342] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 185.818426][T10345] FAULT_INJECTION: forcing a failure. [ 185.818426][T10345] name failslab, interval 1, probability 0, space 0, times 0 [ 185.856582][T10342] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 185.867251][T10333] CPU: 0 PID: 10333 Comm: syz-executor.2 Not tainted 5.2.0-next-20190708 #33 [ 185.876041][T10333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.886107][T10333] Call Trace: [ 185.889423][T10333] dump_stack+0x172/0x1f0 [ 185.893777][T10333] should_fail.cold+0xa/0x15 [ 185.898386][T10333] ? fault_create_debugfs_attr+0x180/0x180 [ 185.904300][T10333] ? ___might_sleep+0x163/0x280 [ 185.909172][T10333] __should_failslab+0x121/0x190 [ 185.914135][T10333] should_failslab+0x9/0x14 [ 185.918672][T10333] kmem_cache_alloc+0x2aa/0x710 [ 185.923553][T10333] ? rcu_read_lock_sched_held+0x110/0x130 [ 185.929280][T10333] ? kmem_cache_alloc+0x364/0x710 [ 185.935058][T10333] security_file_alloc+0x39/0x170 [ 185.940102][T10333] __alloc_file+0xac/0x300 [ 185.944541][T10333] alloc_empty_file+0x72/0x170 [ 185.949317][T10333] alloc_file+0x5e/0x4d0 [ 185.953567][T10333] alloc_file_pseudo+0x189/0x280 [ 185.958517][T10333] ? alloc_file+0x4d0/0x4d0 [ 185.963040][T10333] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 185.969299][T10333] __shmem_file_setup.part.0+0x108/0x2b0 [ 185.974945][T10333] shmem_file_setup+0x66/0x90 [ 185.979631][T10333] __x64_sys_memfd_create+0x2a2/0x470 [ 185.985016][T10333] ? memfd_fcntl+0x1580/0x1580 [ 185.989795][T10333] ? do_syscall_64+0x26/0x6a0 [ 185.994481][T10333] ? lockdep_hardirqs_on+0x418/0x5d0 [ 185.999811][T10333] ? trace_hardirqs_on+0x67/0x240 [ 186.004868][T10333] do_syscall_64+0xfd/0x6a0 [ 186.009390][T10333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.015291][T10333] RIP: 0033:0x4597c9 [ 186.019192][T10333] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.038806][T10333] RSP: 002b:00007fc657032a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 186.047235][T10333] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597c9 [ 186.055223][T10333] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be6cc 00:20:24 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 186.063213][T10333] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 186.071199][T10333] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc6570336d4 [ 186.079200][T10333] R13: 00000000004c87cb R14: 00000000004df3c8 R15: 0000000000000003 [ 186.087395][T10345] CPU: 1 PID: 10345 Comm: syz-executor.5 Not tainted 5.2.0-next-20190708 #33 [ 186.096178][T10345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.106271][T10345] Call Trace: [ 186.109580][T10345] dump_stack+0x172/0x1f0 [ 186.113941][T10345] should_fail.cold+0xa/0x15 [ 186.118560][T10345] ? fault_create_debugfs_attr+0x180/0x180 [ 186.124488][T10345] ? ___might_sleep+0x163/0x280 [ 186.129360][T10345] __should_failslab+0x121/0x190 [ 186.134326][T10345] should_failslab+0x9/0x14 [ 186.138835][T10345] kmem_cache_alloc+0x2aa/0x710 [ 186.138856][T10345] ? rcu_read_lock_sched_held+0x110/0x130 [ 186.138868][T10345] ? kmem_cache_alloc+0x364/0x710 [ 186.138889][T10345] security_file_alloc+0x39/0x170 [ 186.138916][T10345] __alloc_file+0xac/0x300 [ 186.138934][T10345] alloc_empty_file+0x72/0x170 [ 186.138951][T10345] alloc_file+0x5e/0x4d0 [ 186.138972][T10345] alloc_file_pseudo+0x189/0x280 [ 186.177946][T10345] ? alloc_file+0x4d0/0x4d0 [ 186.182481][T10345] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 186.188758][T10345] __shmem_file_setup.part.0+0x108/0x2b0 [ 186.194417][T10345] shmem_file_setup+0x66/0x90 [ 186.199115][T10345] __x64_sys_memfd_create+0x2a2/0x470 [ 186.204505][T10345] ? memfd_fcntl+0x1580/0x1580 [ 186.209284][T10345] ? do_syscall_64+0x26/0x6a0 [ 186.213976][T10345] ? lockdep_hardirqs_on+0x418/0x5d0 [ 186.219273][T10345] ? trace_hardirqs_on+0x67/0x240 [ 186.224313][T10345] do_syscall_64+0xfd/0x6a0 [ 186.228839][T10345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.234738][T10345] RIP: 0033:0x4597c9 [ 186.238668][T10345] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.258295][T10345] RSP: 002b:00007ff864e1fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 186.266737][T10345] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597c9 [ 186.274751][T10345] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be6cc [ 186.282765][T10345] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 186.291192][T10345] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff864e206d4 [ 186.299171][T10345] R13: 00000000004c8748 R14: 00000000004df338 R15: 0000000000000003 00:20:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:24 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:24 executing program 5 (fault-call:2 fault-nth:5): mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:24 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 186.528402][T10368] FAULT_INJECTION: forcing a failure. [ 186.528402][T10368] name failslab, interval 1, probability 0, space 0, times 0 [ 186.594403][T10368] CPU: 1 PID: 10368 Comm: syz-executor.2 Not tainted 5.2.0-next-20190708 #33 [ 186.603206][T10368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.613276][T10368] Call Trace: [ 186.616594][T10368] dump_stack+0x172/0x1f0 [ 186.620844][T10374] FAULT_INJECTION: forcing a failure. [ 186.620844][T10374] name failslab, interval 1, probability 0, space 0, times 0 [ 186.620952][T10368] should_fail.cold+0xa/0x15 [ 186.638165][T10368] ? fault_create_debugfs_attr+0x180/0x180 00:20:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) [ 186.643989][T10368] ? ___might_sleep+0x163/0x280 [ 186.648854][T10368] __should_failslab+0x121/0x190 [ 186.653807][T10368] should_failslab+0x9/0x14 [ 186.658324][T10368] __kmalloc+0x2e0/0x770 [ 186.662585][T10368] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 186.668326][T10368] ? rcu_read_lock_sched_held+0x110/0x130 [ 186.674062][T10368] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 186.679807][T10368] tomoyo_realpath_from_path+0xcd/0x7a0 [ 186.685360][T10368] ? tomoyo_path_perm+0x1cb/0x430 [ 186.690404][T10368] tomoyo_path_perm+0x230/0x430 [ 186.695268][T10368] ? tomoyo_path_perm+0x1cb/0x430 [ 186.700315][T10368] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 186.706415][T10368] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.712709][T10368] tomoyo_path_truncate+0x1d/0x30 [ 186.717759][T10368] security_path_truncate+0xf2/0x150 [ 186.723070][T10368] do_sys_ftruncate+0x3d9/0x550 [ 186.727950][T10368] __x64_sys_ftruncate+0x59/0x80 [ 186.732904][T10368] do_syscall_64+0xfd/0x6a0 [ 186.737441][T10368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.743345][T10368] RIP: 0033:0x459797 [ 186.747244][T10368] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.768454][T10368] RSP: 002b:00007fc657032a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 186.768472][T10368] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459797 [ 186.768479][T10368] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 186.768487][T10368] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 186.768494][T10368] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 186.768502][T10368] R13: 00000000004c87cb R14: 00000000004df3c8 R15: 0000000000000003 [ 186.788034][T10372] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 186.798322][T10374] CPU: 0 PID: 10374 Comm: syz-executor.5 Not tainted 5.2.0-next-20190708 #33 [ 186.823166][T10372] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 186.828523][T10374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.828531][T10374] Call Trace: [ 186.828556][T10374] dump_stack+0x172/0x1f0 [ 186.828581][T10374] should_fail.cold+0xa/0x15 [ 186.828601][T10374] ? fault_create_debugfs_attr+0x180/0x180 [ 186.828627][T10374] ? ___might_sleep+0x163/0x280 [ 186.838349][T10368] ERROR: Out of memory at tomoyo_realpath_from_path. [ 186.847711][T10374] __should_failslab+0x121/0x190 [ 186.847733][T10374] should_failslab+0x9/0x14 [ 186.847747][T10374] __kmalloc+0x2e0/0x770 [ 186.847767][T10374] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 186.847788][T10374] ? rcu_read_lock_sched_held+0x110/0x130 [ 186.847802][T10374] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 186.847819][T10374] tomoyo_realpath_from_path+0xcd/0x7a0 [ 186.847847][T10374] ? tomoyo_path_perm+0x1cb/0x430 [ 186.896787][T10374] tomoyo_path_perm+0x230/0x430 [ 186.896804][T10374] ? tomoyo_path_perm+0x1cb/0x430 [ 186.896828][T10374] ? tomoyo_check_open_permission+0x3f0/0x3f0 00:20:25 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) recvfrom$ax25(r0, &(0x7f0000000380)=""/171, 0xab, 0x1, &(0x7f0000000440)={{0x3, @bcast}, [@null, @default, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4c4100, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18, 0x71, 0x1, {{0x3232458b7756e6b9, 0x2, 0x3}, 0x3}}, 0x18) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000100), &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000240), &(0x7f0000000280)=0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000004c0)=0x2, 0x4) 00:20:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) [ 186.896862][T10374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.896911][T10374] tomoyo_path_truncate+0x1d/0x30 [ 186.956033][T10374] security_path_truncate+0xf2/0x150 [ 186.961428][T10374] do_sys_ftruncate+0x3d9/0x550 [ 186.966301][T10374] __x64_sys_ftruncate+0x59/0x80 [ 186.971254][T10374] do_syscall_64+0xfd/0x6a0 [ 186.975783][T10374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.981657][T10374] RIP: 0033:0x459797 [ 186.985543][T10374] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.005181][T10374] RSP: 002b:00007ff864e1fa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 187.013582][T10374] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459797 [ 187.021564][T10374] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 187.029525][T10374] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 187.037497][T10374] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 187.045478][T10374] R13: 00000000004c8748 R14: 00000000004df338 R15: 0000000000000003 [ 187.064175][T10374] ERROR: Out of memory at tomoyo_realpath_from_path. [ 187.108080][T10368] jfs: Unrecognized mount option "defcontext=staff_u" or missing value [ 187.124652][T10374] EXT4-fs (sda1): Cannot specify journal on remount 00:20:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:25 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xce) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:25 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:25 executing program 5 (fault-call:2 fault-nth:6): mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) recvfrom$ax25(r0, &(0x7f0000000380)=""/171, 0xab, 0x1, &(0x7f0000000440)={{0x3, @bcast}, [@null, @default, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4c4100, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18, 0x71, 0x1, {{0x3232458b7756e6b9, 0x2, 0x3}, 0x3}}, 0x18) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000100), &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000240), &(0x7f0000000280)=0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000004c0)=0x2, 0x4) [ 187.536085][T10416] FAULT_INJECTION: forcing a failure. [ 187.536085][T10416] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 187.549337][T10416] CPU: 0 PID: 10416 Comm: syz-executor.2 Not tainted 5.2.0-next-20190708 #33 [ 187.558107][T10416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.568179][T10416] Call Trace: [ 187.571485][T10416] dump_stack+0x172/0x1f0 [ 187.575833][T10416] should_fail.cold+0xa/0x15 [ 187.580439][T10416] ? fault_create_debugfs_attr+0x180/0x180 [ 187.586248][T10416] ? is_bpf_text_address+0xac/0x170 [ 187.591466][T10416] should_fail_alloc_page+0x50/0x60 [ 187.596668][T10416] __alloc_pages_nodemask+0x1a1/0x900 [ 187.602050][T10416] ? __alloc_pages_slowpath+0x2520/0x2520 [ 187.607778][T10416] ? __kasan_check_read+0x11/0x20 [ 187.612821][T10416] ? fault_create_debugfs_attr+0x180/0x180 [ 187.618639][T10416] cache_grow_begin+0x90/0xd20 [ 187.623423][T10416] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 187.629156][T10416] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 187.635418][T10416] __kmalloc+0x6b2/0x770 [ 187.639682][T10416] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 187.645428][T10416] tomoyo_realpath_from_path+0xcd/0x7a0 [ 187.651013][T10416] ? tomoyo_path_perm+0x1cb/0x430 [ 187.656631][T10416] tomoyo_path_perm+0x230/0x430 [ 187.661532][T10416] ? tomoyo_path_perm+0x1cb/0x430 [ 187.666574][T10416] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 187.672678][T10416] ? perf_trace_lock_acquire+0xf5/0x530 [ 187.678241][T10416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.684543][T10416] tomoyo_path_truncate+0x1d/0x30 [ 187.689615][T10416] security_path_truncate+0xf2/0x150 [ 187.694917][T10416] do_sys_ftruncate+0x3d9/0x550 [ 187.699799][T10416] __x64_sys_ftruncate+0x59/0x80 [ 187.704750][T10416] do_syscall_64+0xfd/0x6a0 [ 187.709276][T10416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.715876][T10416] RIP: 0033:0x459797 [ 187.719777][T10416] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.739479][T10416] RSP: 002b:00007fc657032a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 187.747899][T10416] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459797 [ 187.755872][T10416] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 187.763855][T10416] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 187.771839][T10416] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 187.780834][T10416] R13: 00000000004c87cb R14: 00000000004df3c8 R15: 0000000000000003 [ 187.793454][T10419] FAULT_INJECTION: forcing a failure. [ 187.793454][T10419] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 187.806706][T10419] CPU: 1 PID: 10419 Comm: syz-executor.5 Not tainted 5.2.0-next-20190708 #33 [ 187.815490][T10419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.825565][T10419] Call Trace: [ 187.828878][T10419] dump_stack+0x172/0x1f0 [ 187.833234][T10419] should_fail.cold+0xa/0x15 [ 187.837842][T10419] ? fault_create_debugfs_attr+0x180/0x180 [ 187.843661][T10419] ? is_bpf_text_address+0xac/0x170 [ 187.848889][T10419] should_fail_alloc_page+0x50/0x60 [ 187.854108][T10419] __alloc_pages_nodemask+0x1a1/0x900 [ 187.859498][T10419] ? __alloc_pages_slowpath+0x2520/0x2520 [ 187.865256][T10419] ? __kasan_check_read+0x11/0x20 [ 187.870311][T10419] ? fault_create_debugfs_attr+0x180/0x180 [ 187.876146][T10419] cache_grow_begin+0x90/0xd20 [ 187.880940][T10419] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 187.887207][T10419] __kmalloc+0x6b2/0x770 [ 187.891480][T10419] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 187.897225][T10419] tomoyo_realpath_from_path+0xcd/0x7a0 [ 187.902787][T10419] ? tomoyo_path_perm+0x1cb/0x430 [ 187.907838][T10419] tomoyo_path_perm+0x230/0x430 [ 187.912701][T10419] ? tomoyo_path_perm+0x1cb/0x430 [ 187.917934][T10419] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 187.924050][T10419] ? native_iret+0x7/0x7 [ 187.928345][T10419] tomoyo_path_truncate+0x1d/0x30 [ 187.933382][T10419] security_path_truncate+0xf2/0x150 [ 187.938679][T10419] do_sys_ftruncate+0x3d9/0x550 [ 187.943651][T10419] __x64_sys_ftruncate+0x59/0x80 [ 187.948596][T10419] do_syscall_64+0xfd/0x6a0 [ 187.953108][T10419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.959003][T10419] RIP: 0033:0x459797 [ 187.962899][T10419] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:20:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) [ 187.982519][T10419] RSP: 002b:00007ff864ddda88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 187.990949][T10419] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459797 [ 187.998929][T10419] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 188.006913][T10419] RBP: 000000000075c070 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 188.014888][T10419] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 188.022869][T10419] R13: 00000000004c8748 R14: 00000000004df338 R15: 0000000000000003 00:20:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:26 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 188.196133][T10416] jfs: Unrecognized mount option "defcontext=staff_u" or missing value [ 188.198264][T10419] EXT4-fs (sda1): Cannot specify journal on remount 00:20:26 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) recvfrom$ax25(r0, &(0x7f0000000380)=""/171, 0xab, 0x1, &(0x7f0000000440)={{0x3, @bcast}, [@null, @default, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4c4100, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18, 0x71, 0x1, {{0x3232458b7756e6b9, 0x2, 0x3}, 0x3}}, 0x18) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000100), &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000240), &(0x7f0000000280)=0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f00000000c0)=0x20, 0xffffffffffffff58) 00:20:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:26 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) [ 188.412184][T10441] FAULT_INJECTION: forcing a failure. [ 188.412184][T10441] name failslab, interval 1, probability 0, space 0, times 0 [ 188.499575][T10441] CPU: 1 PID: 10441 Comm: syz-executor.2 Not tainted 5.2.0-next-20190708 #33 [ 188.508392][T10441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.518463][T10441] Call Trace: [ 188.521768][T10441] dump_stack+0x172/0x1f0 [ 188.526116][T10441] should_fail.cold+0xa/0x15 [ 188.530718][T10441] ? fault_create_debugfs_attr+0x180/0x180 [ 188.536557][T10441] ? ___might_sleep+0x163/0x280 [ 188.541423][T10441] __should_failslab+0x121/0x190 [ 188.546378][T10441] should_failslab+0x9/0x14 [ 188.550891][T10441] __kmalloc+0x2e0/0x770 [ 188.555152][T10441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 188.561406][T10441] ? simple_dname+0xd1/0x1f0 [ 188.566009][T10441] ? tomoyo_encode2.part.0+0xf5/0x400 [ 188.571395][T10441] tomoyo_encode2.part.0+0xf5/0x400 [ 188.576631][T10441] tomoyo_encode+0x2b/0x50 [ 188.576647][T10441] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 188.576663][T10441] ? tomoyo_path_perm+0x1cb/0x430 [ 188.576686][T10441] tomoyo_path_perm+0x230/0x430 [ 188.576700][T10441] ? tomoyo_path_perm+0x1cb/0x430 [ 188.576721][T10441] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 188.576756][T10441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 188.576804][T10441] tomoyo_path_truncate+0x1d/0x30 [ 188.619170][T10441] security_path_truncate+0xf2/0x150 [ 188.624481][T10441] do_sys_ftruncate+0x3d9/0x550 [ 188.629348][T10441] __x64_sys_ftruncate+0x59/0x80 [ 188.634294][T10441] do_syscall_64+0xfd/0x6a0 [ 188.638828][T10441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.644729][T10441] RIP: 0033:0x459797 [ 188.648634][T10441] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.675659][T10441] RSP: 002b:00007fc657032a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 188.684094][T10441] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459797 [ 188.692077][T10441] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 00:20:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:26 executing program 3: pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) [ 188.700068][T10441] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 188.708137][T10441] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 188.716121][T10441] R13: 00000000004c87cb R14: 00000000004df3c8 R15: 0000000000000003 [ 188.771844][T10441] ERROR: Out of memory at tomoyo_realpath_from_path. 00:20:26 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) [ 188.818146][T10441] jfs: Unrecognized mount option "defcontext=staff_u" or missing value 00:20:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) recvfrom$ax25(r0, &(0x7f0000000380)=""/171, 0xab, 0x1, &(0x7f0000000440)={{0x3, @bcast}, [@null, @default, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4c4100, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18, 0x71, 0x1, {{0x3232458b7756e6b9, 0x2, 0x3}, 0x3}}, 0x18) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000100), &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000240), &(0x7f0000000280)=0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f00000000c0)=0x20, 0xffffffffffffff58) 00:20:27 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-9'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) 00:20:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) [ 189.034735][T10463] EXT4-fs (sda1): Cannot specify journal on remount 00:20:27 executing program 3: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) getuid() r1 = request_key(0x0, &(0x7f00000007c0)={'syz'}, 0x0, 0xfffffffffffffff9) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x46) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000940)={'syz'}, 0x0, 0x0, r1) recvmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000000, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="f8a86e135939b1c98c9505164e345ca51e97a71e15a053f73772b47dffffffffc8db851f5a381cb96161f7605ff2d6b6c63b3999a01e462e18a35ef20a33f80a4600"/77], 0x0) 00:20:27 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:27 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x2, 0x0, 0x0, 0x880420, &(0x7f0000000300)={[{@journal_dev={'journal_dev'}}]}) 00:20:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) 00:20:27 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000002c0)=0x4e5ff0c6) 00:20:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x1b2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0x1981, 0x3e0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x700) [ 189.438308][ T9140] ------------[ cut here ]------------ [ 189.444278][ T9140] kernel BUG at lib/lockref.c:189! [ 189.449783][ T9140] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 189.455874][ T9140] CPU: 0 PID: 9140 Comm: syz-executor.0 Not tainted 5.2.0-next-20190708 #33 [ 189.464550][ T9140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.474807][ T9140] RIP: 0010:lockref_mark_dead+0x8b/0xa0 [ 189.480358][ T9140] Code: 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 04 3c 03 7e 1d c7 43 38 80 ff ff ff 5b 41 5c 5d c3 e8 75 19 38 fe <0f> 0b 48 89 df e8 0b 59 72 fe eb ab e8 a4 59 72 fe eb dc 90 90 55 [ 189.499965][ T9140] RSP: 0018:ffff88809922fc90 EFLAGS: 00010293 [ 189.506053][ T9140] RAX: ffff88808e0b65c0 RBX: ffff888092872600 RCX: ffffffff833a3abf [ 189.514038][ T9140] RDX: 0000000000000000 RSI: ffffffff833a3afb RDI: 0000000000000005 [ 189.522024][ T9140] RBP: ffff88809922fca0 R08: ffff88808e0b65c0 R09: ffffed101250e4c1 [ 189.530001][ T9140] R10: ffffed101250e4c0 R11: ffff888092872603 R12: 0000000000000000 [ 189.537982][ T9140] R13: ffff888092872600 R14: ffff888092872580 R15: 0000000000000000 [ 189.545959][ T9140] FS: 0000555556ebc940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 189.554884][ T9140] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 189.561462][ T9140] CR2: 00007ffeba2f7e2c CR3: 000000009584f000 CR4: 00000000001406f0 [ 189.569433][ T9140] Call Trace: [ 189.572746][ T9140] __dentry_kill+0x5f/0x600 [ 189.577257][ T9140] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.583515][ T9140] shrink_dcache_parent+0x2c9/0x3d0 [ 189.588741][ T9140] ? shrink_dcache_sb+0x270/0x270 [ 189.593771][ T9140] ? __kasan_check_read+0x11/0x20 [ 189.598803][ T9140] ? do_raw_spin_unlock+0x57/0x270 [ 189.603911][ T9140] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.610170][ T9140] vfs_rmdir+0x26f/0x4f0 [ 189.614417][ T9140] ? security_path_rmdir+0x110/0x160 [ 189.619723][ T9140] do_rmdir+0x39e/0x420 [ 189.623873][ T9140] ? __ia32_sys_mkdir+0x80/0x80 [ 189.628719][ T9140] ? blkcg_exit_queue+0x30/0x30 [ 189.633571][ T9140] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.639038][ T9140] ? do_syscall_64+0x26/0x6a0 [ 189.643717][ T9140] ? lockdep_hardirqs_on+0x418/0x5d0 [ 189.649007][ T9140] __x64_sys_rmdir+0x36/0x40 [ 189.654062][ T9140] do_syscall_64+0xfd/0x6a0 [ 189.658569][ T9140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.664451][ T9140] RIP: 0033:0x459537 [ 189.668346][ T9140] Code: 00 66 90 b8 57 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 54 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.687947][ T9140] RSP: 002b:00007fff479af888 EFLAGS: 00000207 ORIG_RAX: 0000000000000054 [ 189.696357][ T9140] RAX: ffffffffffffffda RBX: 0000000000000065 RCX: 0000000000459537 [ 189.704326][ T9140] RDX: 0000000000000000 RSI: 0000000000714698 RDI: 00007fff479b09c0 [ 189.712294][ T9140] RBP: 0000000000000090 R08: 0000000000000000 R09: 0000000000000001 [ 189.720267][ T9140] R10: 0000000000000006 R11: 0000000000000207 R12: 00007fff479b09c0 [ 189.728237][ T9140] R13: 0000555556ebd940 R14: 0000000000000000 R15: 00007fff479b09c0 [ 189.736230][ T9140] Modules linked in: [ 189.740198][ T9140] ---[ end trace 8603bca46637b4cc ]--- [ 189.745674][ T9140] RIP: 0010:lockref_mark_dead+0x8b/0xa0 [ 189.751272][ T9140] Code: 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 04 3c 03 7e 1d c7 43 38 80 ff ff ff 5b 41 5c 5d c3 e8 75 19 38 fe <0f> 0b 48 89 df e8 0b 59 72 fe eb ab e8 a4 59 72 fe eb dc 90 90 55 [ 189.770946][ T9140] RSP: 0018:ffff88809922fc90 EFLAGS: 00010293 [ 189.777069][ T9140] RAX: ffff88808e0b65c0 RBX: ffff888092872600 RCX: ffffffff833a3abf [ 189.785232][ T9140] RDX: 0000000000000000 RSI: ffffffff833a3afb RDI: 0000000000000005 [ 189.793267][ T9140] RBP: ffff88809922fca0 R08: ffff88808e0b65c0 R09: ffffed101250e4c1 [ 189.801283][ T9140] R10: ffffed101250e4c0 R11: ffff888092872603 R12: 0000000000000000 [ 189.809295][ T9140] R13: ffff888092872600 R14: ffff888092872580 R15: 0000000000000000 [ 189.817308][ T9140] FS: 0000555556ebc940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 189.826258][ T9140] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 189.832899][ T9140] CR2: 00007ffeba2f7e2c CR3: 000000009584f000 CR4: 00000000001406f0 [ 189.840970][ T9140] Kernel panic - not syncing: Fatal exception [ 189.848015][ T9140] Kernel Offset: disabled [ 189.852335][ T9140] Rebooting in 86400 seconds..